r1000)gfx/src/os2/nsFontMetricsOS2.cpp:767 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1001)gfx/src/os2/nsFontMetricsOS2.cpp:1136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1002)gfx/src/os2/nsFontMetricsOS2.cpp:535 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1003)gfx/src/os2/nsFontMetricsOS2.cpp:645 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1004)gfx/src/os2/nsFontMetricsOS2.cpp:699 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1005)gfx/src/os2/nsFontMetricsOS2.cpp:729 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1006)gfx/src/os2/nsFontMetricsOS2.cpp:775 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1007)gfx/src/os2/nsFontMetricsOS2.cpp:1838 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1008)gfx/src/os2/nsFontMetricsOS2.cpp:1839 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1009)gfx/src/os2/nsGfxDefs.cpp:653 Medium: tempname: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r1010)gfx/src/os2/nsGfxDefs.cpp:129 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1011)gfx/src/os2/nsRenderingContextOS2.cpp:131 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1012)gfx/src/os2/nsFontMetricsOS2.h:1277 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1013)gfx/src/os2/nsPrintdOS2.h:90 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1014)gfx/src/os2/nsPrintdOS2.h:91 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1015)gfx/src/photon/nsDeviceContextPh.cpp:53 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1016)gfx/src/photon/nsDeviceContextPh.cpp:54 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1017)gfx/src/photon/nsDeviceContextPh.cpp:344 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1019)gfx/src/photon/nsScreenPh.cpp:174 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1020)gfx/src/photon/nsScreenPh.cpp:205 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1021)gfx/src/photon/nsScreenPh.cpp:206 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1023)gfx/src/ps/nsAFMObject.cpp:238 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1024)gfx/src/ps/nsAFMObject.cpp:801 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1025)gfx/src/ps/nsAFMObject.cpp:818 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1026)gfx/src/ps/nsAFMObject.cpp:802 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1027)gfx/src/ps/nsAFMObject.cpp:819 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1028)gfx/src/ps/nsPostScriptObj.cpp:608 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1029)gfx/src/ps/nsPostScriptObj.cpp:620 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1031)gfx/src/ps/nsPostScriptObj.cpp:643 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1032)gfx/src/ps/nsPostScriptObj.cpp:654 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1034)gfx/src/ps/nsPostScriptObj.cpp:327 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1035)gfx/src/ps/nsPostScriptObj.cpp:2061 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1036)gfx/src/ps/nsPostScriptObj.cpp:2082 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1037)gfx/src/ps/nsPostScriptObj.cpp:2163 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1038)gfx/src/ps/nsPostScriptObj.cpp:2070 High: system: Argument 1 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r1039)gfx/src/ps/nsPostScriptObj.cpp:2085 High: popen: Argument 1 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r1040)gfx/src/ps/nsRenderingContextPS.cpp:368 Medium: tmpfile: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r1041)gfx/src/ps/nsAFMObject.h:957 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1042)gfx/src/ps/nsPostScriptObj.h:405 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1043)gfx/src/qt/nsDeviceContextSpecQT.cpp:227 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1044)gfx/src/qt/nsDeviceContextSpecQT.cpp:180 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1045)gfx/src/qt/nsDeviceContextSpecQT.cpp:181 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1046)gfx/src/qt/nsDeviceContextSpecQT.cpp:194 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1047)gfx/src/qt/nsFontMetricsQT.cpp:180 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1048)gfx/src/qt/nsFontMetricsQT.cpp:181 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1049)gfx/src/qt/nsFontMetricsQT.cpp:194 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1051)gfx/src/windows/nsDeviceContextWin.cpp:486 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1052)gfx/src/windows/nsDeviceContextWin.cpp:496 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1053)gfx/src/windows/nsFontMetricsWin.cpp:596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1054)gfx/src/windows/nsFontMetricsWin.cpp:931 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1055)gfx/src/windows/nsFontMetricsWin.cpp:393 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1056)gfx/src/windows/nsFontMetricsWin.cpp:1975 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1057)gfx/src/windows/nsFontMetricsWin.cpp:2065 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1058)gfx/src/windows/nsFontMetricsWin.cpp:3845 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1059)gfx/src/windows/nsFontMetricsWin.cpp:3848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1060)gfx/src/windows/nsFontMetricsWin.cpp:3869 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1061)gfx/src/windows/nsFontMetricsWin.cpp:3872 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1062)gfx/src/windows/nsFontMetricsWin.cpp:3894 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1063)gfx/src/windows/nsFontMetricsWin.cpp:3897 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1064)gfx/src/windows/nsFontMetricsWin.cpp:4257 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1065)gfx/src/windows/nsFontMetricsWin.cpp:4361 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1066)gfx/src/windows/nsFontMetricsWin.cpp:4372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1067)gfx/src/windows/nsFontMetricsWin.cpp:4391 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1068)gfx/src/windows/nsFontMetricsWin.cpp:4411 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1069)gfx/src/windows/nsFontMetricsWin.cpp:4613 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1070)gfx/src/windows/nsFontMetricsWin.cpp:4950 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1071)gfx/src/windows/nsImageWin.cpp:2049 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1072)gfx/src/windows/nsImageWin.cpp:3677 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1073)gfx/src/windows/nsImageWin.cpp:146 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1074)gfx/src/windows/nsImageWin.cpp:151 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1075)gfx/src/windows/nsImageWin.cpp:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1076)gfx/src/windows/nsImageWin.cpp:214 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1077)gfx/src/windows/nsImageWin.cpp:1308 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1078)gfx/src/windows/nsImageWin.cpp:1360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1079)gfx/src/windows/nsImageWin.cpp:1365 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1080)gfx/src/windows/nsNativeThemeWin.cpp:1071 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1081)gfx/src/windows/nsRenderingContextWin.cpp:166 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1082)gfx/src/windows/nsFontMetricsWin.h:1501 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1083)gfx/src/x11shared/nsFontFreeType.cpp:104 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1084)gfx/src/x11shared/nsFT2FontCatalog.cpp:796 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1085)gfx/src/x11shared/nsFT2FontCatalog.cpp:826 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1086)gfx/src/x11shared/nsFT2FontCatalog.cpp:859 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1087)gfx/src/x11shared/nsFT2FontCatalog.cpp:277 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1088)gfx/src/x11shared/nsFT2FontCatalog.cpp:923 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1089)gfx/src/x11shared/nsFT2FontCatalog.cpp:972 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1090)gfx/src/x11shared/nsFT2FontCatalog.cpp:982 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1091)gfx/src/x11shared/nsFT2FontCatalog.cpp:1264 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1092)gfx/src/x11shared/nsFT2FontCatalog.cpp:1276 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1093)gfx/src/x11shared/nsFT2FontCatalog.cpp:2116 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1094)gfx/src/x11shared/nsFT2FontCatalog.cpp:2117 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1095)gfx/src/x11shared/nsFT2FontCatalog.cpp:2177 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1096)gfx/src/x11shared/nsFT2FontCatalog.cpp:2197 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1097)gfx/src/x11shared/nsFT2FontCatalog.cpp:2198 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1098)gfx/src/x11shared/nsFT2FontCatalog.cpp:2286 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1099)gfx/src/x11shared/nsFT2FontCatalog.h:230 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1100)gfx/src/x11shared/nsFT2FontCatalog.h:299 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1101)gfx/src/xlib/nsDeviceContextSpecXlib.cpp:123 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1102)gfx/src/xlib/nsFontMetricsXlib.cpp:330 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1103)gfx/src/xlib/nsFontMetricsXlib.cpp:332 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1104)gfx/src/xlib/nsFontMetricsXlib.cpp:334 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1105)gfx/src/xlib/nsFontMetricsXlib.cpp:336 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1106)gfx/src/xlib/nsFontMetricsXlib.cpp:3195 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1107)gfx/src/xlib/nsFontMetricsXlib.cpp:3217 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1108)gfx/src/xlib/nsFontMetricsXlib.cpp:3252 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1109)gfx/src/xlib/nsFontMetricsXlib.cpp:4316 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1110)gfx/src/xlib/nsFontMetricsXlib.cpp:4489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1111)gfx/src/xlib/nsFontMetricsXlib.cpp:4703 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1112)gfx/src/xlib/nsFontMetricsXlib.cpp:3605 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1113)gfx/src/xlib/nsImageXlib.cpp:4326 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1114)gfx/src/xlib/nsDeviceContextSpecXlib.h:220 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1115)gfx/src/xlib/nsDeviceContextSpecXlib.h:231 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1116)gfx/src/xlib/nsDeviceContextSpecXlib.h:865 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1117)gfx/src/xlibrgb/xlibrgb.c:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1118)gfx/src/xlibrgb/xlibrgb.c:108 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1119)gfx/src/xlibrgb/xlibrgb.c:109 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1120)gfx/src/xlibrgb/xlibrgb.c:110 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1122)gfx/src/xlibrgb/xlibrgb.c:437 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1123)gfx/src/xlibrgb/xlibrgb.c:567 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1124)gfx/src/xlibrgb/xlibrgb.c:596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1125)gfx/src/xlibrgb/xlibrgb.h:4065 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1126)gfx/src/xprint/nsXPrintContext.cpp:89 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1127)gfx/src/xprint/xprintutil.c:87 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1133)gfx/src/xprint/xprintutil.c:537 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1134)gfx/src/xprint/xprintutil.c:687 High: sscanf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1135)gfx/src/xprint/xprintutil_printtofile.c:811 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1136)gfx/src/xprint/xprintutil_printtofile.c:954 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1137)gfx/src/xprint/xprintutil_printtofile.c:1186 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1138)gfx/src/xprint/xprintutil_printtofile.c:1367 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1139)gfx/src/xprint/xprintutil_printtofile.c:1503 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1142)htmlparser/robot/nsDebugRobot.cpp:279 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1143)htmlparser/src/nsDTDUtils.cpp:289 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1144)htmlparser/src/nsExpatDriver.cpp:616 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1145)htmlparser/src/nsExpatDriver.cpp:617 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1146)htmlparser/src/nsExpatDriver.cpp:618 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1147)htmlparser/src/nsExpatDriver.cpp:619 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1148)htmlparser/src/nsExpatDriver.cpp:730 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1149)htmlparser/src/nsScanner.cpp:666 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1150)htmlparser/src/nsScanner.cpp:711 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1151)htmlparser/src/nsScanner.cpp:414 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1152)htmlparser/src/nsViewSourceHTML.cpp:418 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1153)htmlparser/src/prstrm.cpp:961 High: fprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1154)htmlparser/src/prstrm.cpp:975 High: fprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1155)htmlparser/src/prstrm.cpp:1017 High: fprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1156)htmlparser/src/SelfTest.cpp:124 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1158)htmlparser/src/SelfTest.cpp:147 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1159)htmlparser/src/SelfTest.cpp:161 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1160)htmlparser/src/SelfTest.cpp:176 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1161)htmlparser/src/SelfTest.cpp:187 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1162)htmlparser/src/SelfTest.cpp:213 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1170)htmlparser/src/COtherElements.h:76 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1171)htmlparser/src/COtherElements.h:87 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1230)include/minicom.h:68 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1231)include/minicom.h:74 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1232)intl/chardet/src/classic/nsClassicDetectors.cpp:72 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1233)intl/chardet/src/classic/nsClassicDetectors.h:223 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1234)intl/chardet/src/classic/nsClassicDetectors.h:277 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1235)intl/chardet/src/windows/nsNativeDetectors.cpp:75 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1236)intl/chardet/src/windows/nsNativeDetectors.cpp:76 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1237)intl/chardet/src/windows/nsNativeDetectors.cpp:92 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1238)intl/chardet/src/windows/nsNativeDetectors.cpp:93 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1239)intl/chardet/src/windows/nsNativeDetectors.cpp:89 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1247)intl/compatibility/src/nsCSIDtoCharsetName.cpp:65 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1248)intl/compatibility/src/nsCSIDtoCharsetName.cpp:93 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1249)intl/ctl/src/nsUnicodeToSunIndic.cpp:171 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1250)intl/ctl/src/nsUnicodeToSunIndic.cpp:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1251)intl/ctl/src/nsUnicodeToSunIndic.cpp:174 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1252)intl/ctl/src/nsUnicodeToTIS620.cpp:131 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1253)intl/ctl/src/pangoLite/pango-utils.c:141 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1254)intl/ctl/src/pangoLite/pango-utils.c:456 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1257)intl/ctl/src/thaiShaper/thai-x.c:142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1258)intl/locale/src/nsLocaleService.cpp:111 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1259)intl/locale/src/nsLocaleService.cpp:177 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1260)intl/locale/src/nsLocaleService.cpp:187 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1261)intl/locale/src/nsLocaleService.cpp:197 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1264)intl/locale/src/nsLocaleService.cpp:399 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1265)intl/locale/src/nsLocaleService.cpp:402 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1266)intl/locale/src/nsLocaleService.cpp:428 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1267)intl/locale/src/nsScriptableDateFormat.cpp:406 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1268)intl/locale/src/nsScriptableDateFormat.cpp:462 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1269)intl/locale/src/nsScriptableDateFormat.cpp:471 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1270)intl/locale/src/mac/nsCollationMac.cpp:148 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1271)intl/locale/src/mac/nsDateTimeFormatMac.cpp:94 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1272)intl/locale/src/mac/nsMacLocale.cpp:440 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1273)intl/locale/src/mac/nsCollationMac.h:236 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1274)intl/locale/src/mac/nsCollationMac.h:237 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1275)intl/locale/src/mac/nsCollationMac.h:238 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1276)intl/locale/src/os2/nsOS2Locale.cpp:39 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1277)intl/locale/src/os2/nsOS2Locale.cpp:89 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1278)intl/locale/src/os2/nsOS2Locale.cpp:90 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1279)intl/locale/src/os2/nsOS2Locale.cpp:91 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1280)intl/locale/src/os2/nsOS2Locale.cpp:92 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1281)intl/locale/src/unix/nsCollationUnix.cpp:157 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1282)intl/locale/src/unix/nsCollationUnix.cpp:166 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1283)intl/locale/src/unix/nsDateTimeFormatUnix.cpp:155 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1284)intl/locale/src/unix/nsPosixLocale.cpp:145 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1285)intl/locale/src/unix/nsPosixLocale.cpp:198 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1286)intl/locale/src/unix/nsPosixLocale.cpp:199 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1287)intl/locale/src/unix/nsDateTimeFormatUnix.h:64 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1288)intl/locale/src/unix/nsDateTimeFormatUnix.h:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1289)intl/locale/src/unix/nsDateTimeFormatUnix.h:66 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1290)intl/locale/src/unix/nsDateTimeFormatUnix.h:67 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1291)intl/locale/src/unix/nsDateTimeFormatUnix.h:104 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1292)intl/locale/src/unix/nsDateTimeFormatUnix.h:105 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1293)intl/locale/src/unix/nsDateTimeFormatUnix.h:106 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1294)intl/locale/src/unix/nsDateTimeFormatUnix.h:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1295)intl/locale/src/unix/nsDateTimeFormatUnix.h:142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1296)intl/locale/src/windows/nsDateTimeFormatWin.cpp:82 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1297)intl/locale/src/windows/nsIWin32LocaleImpl.cpp:298 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1298)intl/locale/src/windows/nsIWin32LocaleImpl.cpp:321 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1313)intl/strres/src/nsStringBundle.cpp:741 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1314)intl/strres/src/nsStringBundle.cpp:793 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1315)intl/uconv/src/nsTextToSubURI.cpp:365 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1316)intl/uconv/src/nsUnicodeDecodeHelper.cpp:87 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1317)intl/uconv/src/nsWinCharset.cpp:256 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1324)intl/uconv/ucvcn/nsISO2022CNToUnicode.cpp:455 High: gets: Gets is unsafe!! No bounds checking is performed, buffer is easily overflowable by user. Use fgets(buf, size, stdin) instead.
r1325)intl/uconv/ucvja/nsJapaneseToUnicode.cpp:207 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1326)intl/uconv/ucvja/nsJapaneseToUnicode.cpp:280 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1327)intl/uconv/ucvja/nsJapaneseToUnicode.cpp:387 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1328)intl/uconv/ucvja/nsJapaneseToUnicode.cpp:510 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1329)intl/uconv/ucvko/nsISO2022KRToUnicode.cpp:795 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1330)intl/uconv/ucvko/nsISO2022KRToUnicode.cpp:849 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1331)intl/uconv/ucvlatin/nsUCS2BEToUnicode.cpp:158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1332)intl/uconv/util/nsUCRegUtils.cpp:147 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1333)intl/uconv/util/nsUCRegUtils.cpp:254 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1334)intl/uconv/util/nsUCSupport.cpp:86 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1335)intl/unicharutil/src/nsSaveAsCharset.cpp:86 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1336)intl/unicharutil/src/nsSaveAsCharset.cpp:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1337)intl/unicharutil/src/nsSaveAsCharset.cpp:389 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1338)intl/unicharutil/src/nsSaveAsCharset.cpp:518 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1339)intl/unicharutil/src/nsSaveAsCharset.cpp:556 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1340)intl/unicharutil/src/nsSaveAsCharset.cpp:175 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1341)intl/unicharutil/src/ucdata.c:321 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1345)jpeg/cdjpeg.c:223 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1346)jpeg/cdjpeg.c:322 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1347)jpeg/cdjpeg.c:427 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1348)jpeg/cdjpeg.c:453 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1349)jpeg/cdjpeg.c:487 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1350)jpeg/cdjpeg.c:539 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1351)jpeg/cdjpeg.c:591 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1352)jpeg/cdjpeg.c:632 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1353)jpeg/cdjpeg.c:717 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1354)jpeg/cdjpeg.c:762 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1355)jpeg/cjpeg.c:51 Medium: signal: When setting signal handlers, do not use the same function to handle multiple signals. There exists the possibility a race condition will result if 2 or more different signals are sent to the process at nearly the same time. Also, when writing signal handlers, it is best to do as little as possible in them. The best strategy is to use the signal handler to set a flag, that another part of the program tests and performs the appropriate action(s) when it is set. See also: http://razor.bindview.com/publish/papers/signals.txt
r1356)jpeg/cjpeg.c:54 Medium: signal: When setting signal handlers, do not use the same function to handle multiple signals. There exists the possibility a race condition will result if 2 or more different signals are sent to the process at nearly the same time. Also, when writing signal handlers, it is best to do as little as possible in them. The best strategy is to use the signal handler to set a flag, that another part of the program tests and performs the appropriate action(s) when it is set. See also: http://razor.bindview.com/publish/papers/signals.txt
r1357)jpeg/jchuff.c:92 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1358)jpeg/jcmarker.c:185 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1359)jpeg/jdhuff.c:226 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1360)jpeg/jdhuff.c:227 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1361)jpeg/jerror.c:156 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1362)jpeg/jerror.c:115 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1365)jpeg/jmemansi.c:199 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1366)jpeg/jmemansi.c:201 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1367)jpeg/jmemdos.c:144 Medium: tmpfile: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r1370)jpeg/jmemmgr.c:339 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1371)jpeg/jmemmgr.c:372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1372)jpeg/jmemmgr.c:468 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1376)jpeg/jchuff.h:102 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1377)jpeg/jchuff.h:129 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1378)jpeg/jmemsys.h:29 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1379)jpeg/jpeglib.h:156 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1380)jpeg/jpeglib.h:162 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1381)jpeg/jpeglib.h:166 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1382)js/jsd/jsd_scpt.c:691 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1383)js/jsd/jsd_step.c:191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1384)js/jsd/jsd_text.c:106 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1385)js/src/js.c:89 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1386)js/src/js.c:94 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1390)js/src/js.c:139 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1391)js/src/js.c:158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1392)js/src/js.c:273 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1393)js/src/js.c:293 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1394)js/src/js.c:1009 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1395)js/src/js.c:1255 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1396)js/src/js.c:2001 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1401)js/src/jsapi.c:320 Medium: fgetc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1402)js/src/jsapi.c:322 Medium: fgetc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1403)js/src/jsapi.c:178 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1404)js/src/jsapi.c:488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1405)js/src/jsapi.c:2547 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1406)js/src/jsarena.c:1433 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1407)js/src/jsarray.c:245 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1408)js/src/jsatom.c:363 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1409)js/src/jsatom.c:431 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1410)js/src/jsbool.c:515 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1411)js/src/jsbool.c:625 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1412)js/src/jsbool.c:661 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1413)js/src/jsbool.c:807 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1414)js/src/jscntxt.c:68 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1415)js/src/jscpucfg.c:413 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1416)js/src/jsdate.c:220 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1417)js/src/jsdate.c:233 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1418)js/src/jsdate.c:248 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1419)js/src/jsdhash.c:1416 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1420)js/src/jsdhash.c:1499 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1421)js/src/jsdhash.c:1501 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1422)js/src/jsdhash.c:1613 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1423)js/src/jsdhash.c:1720 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1426)js/src/jsemit.c:2109 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1427)js/src/jsemit.c:2946 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1428)js/src/jsexn.c:149 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1429)js/src/jsexn.c:334 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1430)js/src/jsexn.c:450 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1431)js/src/jsfile.c:510 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1432)js/src/jsfile.c:226 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1433)js/src/jsfile.c:798 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1434)js/src/jsfile.c:876 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1435)js/src/jsfile.c:1245 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1436)js/src/jsfile.c:1949 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1437)js/src/jsfile.c:2555 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1441)js/src/jsgc.c:299 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1442)js/src/jsgc.c:488 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1443)js/src/jsgc.c:515 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1444)js/src/jsinterp.c:688 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1445)js/src/jsinterp.c:797 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1446)js/src/jsinterp.c:867 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1447)js/src/jsnum.c:3843 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1448)js/src/jsnum.c:3867 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1449)js/src/jsnum.c:4004 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1450)js/src/jsobj.c:214 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1451)js/src/jsobj.c:215 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1452)js/src/jsobj.c:283 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1453)js/src/jsobj.c:340 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1454)js/src/jsobj.c:614 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1455)js/src/jsobj.c:823 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1456)js/src/jsobj.c:473 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1457)js/src/jsobj.c:3439 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1458)js/src/jsobj.c:3556 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1459)js/src/jsopcode.c:658 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1460)js/src/jsopcode.c:807 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1461)js/src/jsopcode.c:150 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1462)js/src/jsopcode.c:276 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1463)js/src/jsopcode.c:799 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1464)js/src/jsopcode.c:1891 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1465)js/src/jsprf.c:354 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1466)js/src/jsprf.c:541 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1467)js/src/jsprf.c:249 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1468)js/src/jsprf.c:289 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1469)js/src/jsprf.c:336 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1470)js/src/jsprf.c:337 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1471)js/src/jsprf.c:706 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1475)js/src/jsprf.c:1105 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1476)js/src/jsprf.c:1111 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1477)js/src/jsprf.c:1124 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1479)js/src/jsprf.c:1205 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1482)js/src/jsprf.c:1211 High: JS_vsprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1483)js/src/jsprf.c:1216 High: JS_vsprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1484)js/src/jsregexp.c:1080 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1485)js/src/jsscan.c:1222 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1486)js/src/jsscan.c:302 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1487)js/src/jsscan.c:1258 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1488)js/src/jsscript.c:279 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1489)js/src/jsstr.c:67 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1490)js/src/jsutil.c:328 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1491)js/src/jsutil.c:605 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1492)js/src/jsxdrapi.c:154 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1493)js/src/jsprf.h:192 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1494)js/src/jsprf.h:338 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1495)js/src/jsprf.h:72 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1497)js/src/jsprf.h:86 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1498)js/src/jsprf.h:103 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1500)js/src/jsprf.h:104 High: JS_vsprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1501)js/src/jsprf.h:140 High: JS_sscanf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1502)js/src/jsscope.h:140 High: JS_sscanf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1503)js/src/liveconnect/jsj_JavaArray.c:215 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1504)js/src/liveconnect/jsj_utils.c:184 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1505)js/src/xpconnect/loader/mozJSSubScriptLoader.cpp:250 High: JS_vsmprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1506)js/src/xpconnect/shell/xpcshell.cpp:283 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1509)js/src/xpconnect/shell/xpcshell.cpp:424 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1510)js/src/xpconnect/shell/xpcshell.cpp:440 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1512)js/src/xpconnect/src/nsScriptError.cpp:468 Medium: fgetc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1513)js/src/xpconnect/src/nsScriptError.cpp:470 Medium: fgetc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1514)js/src/xpconnect/src/xpccomponents.cpp:155 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1515)js/src/xpconnect/src/xpccomponents.cpp:163 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1516)js/src/xpconnect/src/xpccomponents.cpp:169 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1517)js/src/xpconnect/src/xpcconvert.cpp:707 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1518)js/src/xpconnect/src/xpcdebug.cpp:1174 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1519)js/src/xpconnect/src/xpcdebug.cpp:161 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1523)js/src/xpconnect/src/xpcdebug.cpp:201 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1524)js/src/xpconnect/src/xpcdebug.cpp:223 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1525)js/src/xpconnect/src/xpcdebug.cpp:243 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1526)js/src/xpconnect/src/XPCDispObject.cpp:290 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1527)js/src/xpconnect/src/XPCDispObject.cpp:362 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1528)js/src/xpconnect/src/XPCDispObject.cpp:365 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1529)js/src/xpconnect/src/XPCDispTearOff.cpp:190 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1530)js/src/xpconnect/src/XPCDispTearOff.cpp:191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1531)js/src/xpconnect/src/XPCDispTearOff.cpp:52 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1532)js/src/xpconnect/src/xpcexception.cpp:438 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1533)js/src/xpconnect/src/xpclog.cpp:375 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1534)js/src/xpconnect/src/xpcthrower.cpp:57 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1535)js/src/xpconnect/src/xpcthrower.cpp:86 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1536)js/src/xpconnect/src/xpcwrappedjsclass.cpp:265 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1537)js/src/xpconnect/src/xpcwrappedjsclass.cpp:278 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1538)js/src/xpconnect/src/xpcwrappedjsclass.cpp:1219 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1539)js/src/xpconnect/src/xpcwrappednative.cpp:1272 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1540)js/src/xpconnect/src/xpcwrappednative.cpp:1273 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1541)js/src/xpconnect/src/xpcwrappednative.cpp:1277 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1542)js/src/xpconnect/src/xpcwrappednative.cpp:1282 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1543)js/src/xpconnect/src/xpcwrappednative.cpp:1283 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1546)js/src/xpconnect/src/xpcwrappednative.cpp:2398 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1547)js/src/xpconnect/src/xpcwrappednative.cpp:2421 High: JS_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r1548)js/src/xpconnect/src/xpcwrappednativeinfo.cpp:2436 High: JS_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1549)js/src/xpconnect/src/xpcprivate.h:437 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1550)js/src/xpconnect/src/xpcprivate.h:756 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1551)js/src/xpconnect/src/xpcprivate.h:803 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1556)layout/base/src/nsFrameUtil.cpp:481 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1557)layout/base/src/nsFrameUtil.cpp:128 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1558)layout/base/src/nsFrameUtil.cpp:310 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1559)layout/base/src/nsFrameUtil.cpp:311 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1560)layout/base/src/nsFrameUtil.cpp:371 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1561)layout/base/src/nsFrameUtil.cpp:392 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1562)layout/base/src/nsFrameUtil.cpp:346 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1563)layout/base/src/nsFrameUtil.cpp:360 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1564)layout/base/src/nsFrameUtil.cpp:414 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1565)layout/html/base/src/nsBlockFrame.cpp:375 Medium: fgetc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1566)layout/html/base/src/nsBlockFrame.cpp:396 Medium: fgetc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1567)layout/html/base/src/nsBulletFrame.cpp:1118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1568)layout/html/base/src/nsFrame.cpp:419 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1569)layout/html/base/src/nsFrame.cpp:425 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1570)layout/html/base/src/nsFrame.cpp:2746 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1571)layout/html/base/src/nsFrame.cpp:4694 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1572)layout/html/base/src/nsFrame.cpp:4713 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1573)layout/html/base/src/nsFrame.cpp:4723 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1574)layout/html/base/src/nsFrame.cpp:4737 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1575)layout/html/base/src/nsFrame.cpp:4743 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1576)layout/html/base/src/nsFrame.cpp:4877 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1577)layout/html/base/src/nsFrame.cpp:4878 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1578)layout/html/base/src/nsFrame.cpp:5014 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1579)layout/html/base/src/nsFrame.cpp:5331 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1580)layout/html/base/src/nsFrame.cpp:5332 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1581)layout/html/base/src/nsFrame.cpp:5396 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1582)layout/html/base/src/nsFrame.cpp:5397 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1583)layout/html/base/src/nsFrame.cpp:4887 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1584)layout/html/base/src/nsFrame.cpp:4888 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1585)layout/html/base/src/nsHTMLReflowState.cpp:4985 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1587)layout/html/base/src/nsHTMLReflowState.cpp:4993 Medium: getc: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1590)layout/html/base/src/nsLineBox.cpp:1735 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1591)layout/html/base/src/nsPageFrame.cpp:208 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1592)layout/html/base/src/nsPageFrame.cpp:385 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1593)layout/html/base/src/nsPageFrame.cpp:395 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1594)layout/html/base/src/nsPresShell.cpp:581 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1595)layout/html/base/src/nsPresShell.cpp:411 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1596)layout/html/base/src/nsPresShell.cpp:7639 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1597)layout/html/base/src/nsPresShell.cpp:7667 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1598)layout/html/base/src/nsPresShell.cpp:7678 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1599)layout/html/base/src/nsPresShell.cpp:7807 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1600)layout/html/base/src/nsPresShell.cpp:7921 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1601)layout/html/base/src/nsTextFrame.cpp:7926 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1602)layout/html/forms/src/nsIsIndexFrame.cpp:339 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1603)layout/html/forms/src/nsIsIndexFrame.cpp:3204 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1604)layout/html/forms/src/nsIsIndexFrame.cpp:3220 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1605)layout/html/table/src/BasicTableLayoutStrategy.cpp:550 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1606)layout/html/table/src/nsTableColFrame.cpp:1955 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1607)layout/html/table/src/nsTableFrame.cpp:235 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1623)layout/mathml/base/src/nsMathMLChar.cpp:70 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1624)layout/mathml/base/src/nsMathMLmactionFrame.cpp:409 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1625)layout/mathml/base/src/nsMathMLmactionFrame.cpp:941 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1626)layout/mathml/base/src/nsMathMLmactionFrame.cpp:1580 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1627)layout/mathml/base/src/nsMathMLmactionFrame.cpp:1656 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1628)layout/mathml/base/src/nsMathMLmactionFrame.cpp:1714 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1629)layout/svg/base/src/nsSVGGenericContainerFrame.cpp:437 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1630)layout/svg/base/src/nsSVGRenderingContext.cpp:276 High: printf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1631)layout/xul/base/src/nsBox.cpp:166 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1632)layout/xul/base/src/nsBoxFrame.cpp:101 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1633)layout/xul/base/src/nsBoxFrame.cpp:182 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1634)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2331 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1635)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2332 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1636)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2462 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1637)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2463 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1638)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2464 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1639)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2465 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1640)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2466 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1641)layout/xul/base/src/nsScrollbarButtonFrame.cpp:2467 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1642)layout/xul/base/src/nsSliderFrame.cpp:206 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1643)layout/xul/base/src/nsSplitterFrame.cpp:269 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1644)layout/xul/base/src/nsSplitterFrame.cpp:877 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1645)layout/xul/base/src/nsSplitterFrame.cpp:885 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1646)lib/mac/MacMemoryAllocator/src/fastmem.c:1226 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1647)lib/mac/MacMemoryAllocator/src/fastmem.c:571 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1648)lib/mac/MacMemoryAllocator/src/fastmem.c:665 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1651)lib/mac/MacMemoryAllocator/src/LowLevel.c:506 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1652)lib/mac/MacMemoryAllocator/src/MemoryTracker.c:427 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1653)lib/mac/MacMemoryAllocator/src/MemoryTracker.c:124 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1654)lib/mac/MacMemoryAllocator/src/MemoryTracker.c:1028 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1655)lib/mac/MacMemoryAllocator/src/MemoryTracker.c:1029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1656)lib/mac/MacMemoryAllocator/src/MemoryTracker.c:1093 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1659)lib/mac/MacMemoryAllocator/src/nsGCMalloc.c:1059 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1660)lib/mac/MacMemoryAllocator/src/nsGCMalloc.c:1077 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1661)lib/mac/MacMemoryAllocator/src/nsGCMalloc.c:1087 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1662)lib/mac/MacMemoryAllocator/src/nsGCMalloc.c:1108 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1663)lib/mac/MacMemoryAllocator/src/StdCLevel.c:71 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1664)lib/mac/MacMemoryAllocator/src/StdCLevel.c:840 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1665)lib/mac/MacMemoryAllocator/src/StdCLevel.c:921 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1666)lib/mac/MacMemoryAllocator/src/StdCLevel.c:980 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1667)lib/mac/MacMemoryAllocator/src/StdCLevel.c:1043 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1668)lib/mac/MacMemoryAllocator/src/StdCLevel.c:1067 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1669)lib/mac/MacMemoryAllocator/src/StdCLevel.c:1098 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1670)lib/mac/MacMemoryAllocator/src/StdCLevel.c:1099 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1671)lib/mac/MacMemoryAllocator/src/StdCLevel.c:2778 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1672)lib/mac/MacMemoryAllocator/src/StdCLevel.c:2779 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1677)lib/mac/MoreFiles/FSpCompat.c:735 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1678)lib/mac/MoreFiles/FSpCompat.c:738 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1679)lib/mac/MoreFiles/MoreFilesX.c:599 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1680)lib/mac/MoreFiles/MoreFilesExtras.h:1864 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1681)lib/mac/NSStdLib/src/nsEnvironment.cpp:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1682)lib/mac/NSStdLib/src/nsEnvironment.cpp:251 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1683)lib/mac/NSStdLib/src/nsEnvironment.cpp:315 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1684)lib/mac/NSStdLib/src/nsEnvironment.cpp:52 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1685)lib/mac/NSStdLib/src/nsEnvironment.cpp:56 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1686)lib/mac/NSStdLib/src/nsEnvironment.cpp:76 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1690)mailnews/absync/src/nsAbSync.cpp:1118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1691)mailnews/absync/src/nsAbSync.cpp:1120 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1692)mailnews/absync/src/nsAbSync.cpp:1138 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1693)mailnews/absync/src/nsAbSync.cpp:1139 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1694)mailnews/absync/src/nsABSyncDriver.cpp:2213 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1695)mailnews/absync/src/nsAbSyncPostEngine.cpp:133 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1696)mailnews/absync/src/nsAbSyncPostEngine.cpp:153 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1697)mailnews/absync/src/nsAbSyncPostEngine.cpp:481 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1698)mailnews/absync/src/nsAbSyncPostEngine.cpp:511 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1699)mailnews/addrbook/src/nsAbDirFactoryService.cpp:799 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1700)mailnews/addrbook/src/nsAbDirFactoryService.cpp:98 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1701)mailnews/addrbook/src/nsAbWinHelper.cpp:106 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1702)mailnews/addrbook/src/nsAddrDatabase.cpp:217 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1703)mailnews/addrbook/src/nsAddrDatabase.cpp:503 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1704)mailnews/addrbook/src/nsAddrDatabase.cpp:1601 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1705)mailnews/addrbook/src/nsAddrDatabase.cpp:1716 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1706)mailnews/addrbook/src/nsAddrDatabase.cpp:1890 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1707)mailnews/addrbook/src/nsAddrDatabase.cpp:2333 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1708)mailnews/addrbook/src/nsAddrDatabase.cpp:2397 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1709)mailnews/addrbook/src/nsAddrDatabase.cpp:2410 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1710)mailnews/addrbook/src/nsAddrDatabase.cpp:2953 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1711)mailnews/addrbook/src/nsAddressBook.cpp:512 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1712)mailnews/addrbook/src/nsDirPrefs.cpp:685 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1713)mailnews/addrbook/src/nsDirPrefs.cpp:1235 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1714)mailnews/addrbook/src/nsDirPrefs.cpp:2603 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1715)mailnews/addrbook/src/nsDirPrefs.cpp:2824 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1716)mailnews/addrbook/src/nsDirPrefs.cpp:3008 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1717)mailnews/addrbook/src/nsDirPrefs.cpp:3863 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1718)mailnews/addrbook/src/nsDirPrefs.cpp:4184 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1719)mailnews/addrbook/src/nsDirPrefs.cpp:2147 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1720)mailnews/addrbook/src/nsDirPrefs.cpp:2188 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1721)mailnews/addrbook/src/nsDirPrefs.cpp:2214 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1722)mailnews/addrbook/src/nsDirPrefs.cpp:2233 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1723)mailnews/addrbook/src/nsDirPrefs.cpp:2432 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1724)mailnews/addrbook/src/nsDirPrefs.cpp:2577 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1725)mailnews/addrbook/src/nsDirPrefs.cpp:2611 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1726)mailnews/addrbook/src/nsDirPrefs.cpp:2653 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1727)mailnews/addrbook/src/nsDirPrefs.cpp:3530 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1728)mailnews/addrbook/src/nsDirPrefs.cpp:3582 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1729)mailnews/addrbook/src/nsDirPrefs.cpp:3622 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1730)mailnews/addrbook/src/nsDirPrefs.cpp:3674 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1731)mailnews/addrbook/src/nsDirPrefs.cpp:3738 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1732)mailnews/addrbook/src/nsDirPrefs.cpp:3773 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1733)mailnews/addrbook/src/nsDirPrefs.cpp:3814 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1734)mailnews/addrbook/src/nsDirPrefs.cpp:3915 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1735)mailnews/addrbook/src/nsDirPrefs.cpp:2149 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1736)mailnews/addrbook/src/nsDirPrefs.cpp:2190 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1737)mailnews/addrbook/src/nsDirPrefs.cpp:2216 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1738)mailnews/addrbook/src/nsDirPrefs.cpp:2235 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1739)mailnews/addrbook/src/nsDirPrefs.cpp:2579 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1740)mailnews/addrbook/src/nsDirPrefs.cpp:3532 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1741)mailnews/addrbook/src/nsDirPrefs.cpp:3584 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1742)mailnews/addrbook/src/nsDirPrefs.cpp:3624 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1743)mailnews/addrbook/src/nsDirPrefs.cpp:3678 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1744)mailnews/addrbook/src/nsDirPrefs.cpp:3835 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1745)mailnews/addrbook/src/nsMapiAddressBook.cpp:2967 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1746)mailnews/addrbook/src/nsMapiAddressBook.cpp:2984 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1747)mailnews/addrbook/src/nsMapiAddressBook.cpp:2994 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1748)mailnews/addrbook/src/nsWabAddressBook.cpp:68 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1749)mailnews/addrbook/src/nsWabAddressBook.cpp:75 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1750)mailnews/base/search/src/nsMsgFilter.cpp:70 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1751)mailnews/base/search/src/nsMsgFilterDelegateFactory.cpp:278 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1752)mailnews/base/search/src/nsMsgFilterList.cpp:168 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1753)mailnews/base/search/src/nsMsgFilterList.cpp:387 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1754)mailnews/base/search/src/nsMsgLocalSearch.cpp:523 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1755)mailnews/base/search/src/nsMsgSearchAdapter.cpp:482 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1756)mailnews/base/search/src/nsMsgSearchAdapter.cpp:303 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1757)mailnews/base/search/src/nsMsgSearchAdapter.cpp:502 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1758)mailnews/base/search/src/nsMsgSearchAdapter.cpp:522 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1759)mailnews/base/search/src/nsMsgSearchAdapter.cpp:642 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1760)mailnews/base/search/src/nsMsgSearchAdapter.cpp:719 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1761)mailnews/base/search/src/nsMsgSearchAdapter.cpp:743 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1762)mailnews/base/search/src/nsMsgSearchNews.cpp:507 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1763)mailnews/base/search/src/nsMsgSearchNews.cpp:648 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1764)mailnews/base/search/src/nsMsgSearchNews.cpp:650 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1765)mailnews/base/search/src/nsMsgSearchNews.cpp:652 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1766)mailnews/base/search/src/nsMsgSearchNews.cpp:653 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1767)mailnews/base/search/src/nsMsgSearchNews.cpp:660 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1768)mailnews/base/search/src/nsMsgSearchNews.cpp:662 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1769)mailnews/base/search/src/nsMsgSearchNews.cpp:664 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1770)mailnews/base/search/src/nsMsgSearchNews.cpp:697 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1771)mailnews/base/search/src/nsMsgSearchNews.cpp:752 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1772)mailnews/base/search/src/nsMsgSearchNews.cpp:766 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1773)mailnews/base/search/src/nsMsgSearchNews.cpp:221 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1774)mailnews/base/search/src/nsMsgSearchNews.cpp:241 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1775)mailnews/base/search/src/nsMsgSearchNews.cpp:266 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1776)mailnews/base/search/src/nsMsgSearchNews.cpp:289 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1777)mailnews/base/search/src/nsMsgSearchNews.cpp:300 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1778)mailnews/base/search/src/nsMsgSearchNews.cpp:301 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1779)mailnews/base/search/src/nsMsgSearchTerm.cpp:517 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1780)mailnews/base/search/src/nsMsgSearchTerm.cpp:567 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1781)mailnews/base/src/nsMessenger.cpp:436 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1782)mailnews/base/src/nsMessengerMigrator.cpp:1933 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1783)mailnews/base/src/nsMessengerMigrator.cpp:1934 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1784)mailnews/base/src/nsMessengerMigrator.cpp:1935 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1785)mailnews/base/src/nsMessengerMigrator.cpp:1936 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1786)mailnews/base/src/nsMessengerWinIntegration.cpp:2132 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1787)mailnews/base/src/nsMessengerWinIntegration.cpp:2133 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1788)mailnews/base/src/nsMessengerWinIntegration.cpp:2134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1789)mailnews/base/src/nsMessengerWinIntegration.cpp:2135 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1790)mailnews/base/src/nsMessengerWinIntegration.cpp:180 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1791)mailnews/base/src/nsMessengerWinIntegration.cpp:196 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1792)mailnews/base/src/nsMessengerWinIntegration.cpp:451 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1793)mailnews/base/src/nsMsgPurgeService.cpp:409 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1794)mailnews/base/src/nsMsgThreadedDBView.cpp:486 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1795)mailnews/base/src/nsSpamSettings.cpp:122 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1796)mailnews/base/src/nsSubscribableServer.cpp:370 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1797)mailnews/base/src/nsMsgFolderCompactor.h:639 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1798)mailnews/base/util/nsMsgGroupRecord.cpp:93 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1799)mailnews/base/util/nsMsgGroupRecord.cpp:134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1800)mailnews/base/util/nsMsgGroupRecord.cpp:253 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1801)mailnews/base/util/nsMsgGroupRecord.cpp:286 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1802)mailnews/base/util/nsMsgGroupRecord.cpp:139 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1803)mailnews/base/util/nsMsgGroupRecord.cpp:269 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1804)mailnews/base/util/nsMsgGroupRecord.cpp:290 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1805)mailnews/base/util/nsMsgI18N.cpp:500 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1806)mailnews/base/util/nsMsgKeySet.cpp:124 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1807)mailnews/base/util/nsMsgKeySet.cpp:454 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1808)mailnews/base/util/nsMsgKeySet.cpp:493 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1809)mailnews/base/util/nsMsgKeySet.cpp:494 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1810)mailnews/base/util/nsMsgKeySet.cpp:716 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1811)mailnews/base/util/nsMsgKeySet.cpp:338 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1812)mailnews/base/util/nsMsgMailNewsUrl.cpp:339 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1813)mailnews/base/util/nsMsgProtocol.cpp:843 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1814)mailnews/base/util/nsMsgUtf7Utils.cpp:688 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1815)mailnews/base/util/nsMsgUtf7Utils.cpp:165 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1816)mailnews/base/util/nsMsgUtils.cpp:172 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1817)mailnews/base/util/nsMsgUtils.cpp:260 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1818)mailnews/base/util/nsMsgUtils.cpp:430 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1819)mailnews/compose/src/nsMsgAppleDecode.cpp:471 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1820)mailnews/compose/src/nsMsgAppleDecode.cpp:488 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1821)mailnews/compose/src/nsMsgAppleDecode.cpp:496 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1822)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:163 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1823)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:189 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1824)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:250 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1825)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:283 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1826)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:374 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1827)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:574 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1828)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:576 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1829)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:817 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1830)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:932 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1831)mailnews/compose/src/nsMsgAppleDecodeStream.cpp:1084 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1832)mailnews/compose/src/nsMsgAppleDoubleDecode.cpp:319 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1833)mailnews/compose/src/nsMsgAppleDoubleDecode.cpp:268 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1834)mailnews/compose/src/nsMsgAppleEncode.cpp:271 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1835)mailnews/compose/src/nsMsgAttachmentHandler.cpp:96 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1836)mailnews/compose/src/nsMsgAttachmentHandler.cpp:143 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1837)mailnews/compose/src/nsMsgAttachmentHandler.cpp:292 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1838)mailnews/compose/src/nsMsgAttachmentHandler.cpp:438 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1839)mailnews/compose/src/nsMsgAttachmentHandler.cpp:687 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1840)mailnews/compose/src/nsMsgAttachmentHandler.cpp:211 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1841)mailnews/compose/src/nsMsgAttachmentHandler.cpp:628 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1842)mailnews/compose/src/nsMsgAttachmentHandler.cpp:826 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1843)mailnews/compose/src/nsMsgAttachmentHandler.cpp:1000 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1844)mailnews/compose/src/nsMsgAttachmentHandler.cpp:1007 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1845)mailnews/compose/src/nsMsgAttachmentHandler.cpp:1009 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1846)mailnews/compose/src/nsMsgAttachmentHandler.cpp:1012 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1847)mailnews/compose/src/nsMsgBinHex.cpp:224 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1848)mailnews/compose/src/nsMsgBinHex.cpp:905 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1849)mailnews/compose/src/nsMsgCompose.cpp:339 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1850)mailnews/compose/src/nsMsgCompose.cpp:1799 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1851)mailnews/compose/src/nsMsgCompose.cpp:1834 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1852)mailnews/compose/src/nsMsgCompose.cpp:1836 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1853)mailnews/compose/src/nsMsgCompose.cpp:3354 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1854)mailnews/compose/src/nsMsgComposeService.cpp:3193 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1855)mailnews/compose/src/nsMsgCompUtils.cpp:478 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1856)mailnews/compose/src/nsMsgCompUtils.cpp:522 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1857)mailnews/compose/src/nsMsgCompUtils.cpp:598 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1858)mailnews/compose/src/nsMsgCompUtils.cpp:714 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1859)mailnews/compose/src/nsMsgCompUtils.cpp:809 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1860)mailnews/compose/src/nsMsgCompUtils.cpp:1167 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1861)mailnews/compose/src/nsMsgCompUtils.cpp:1821 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1862)mailnews/compose/src/nsMsgCompUtils.cpp:1822 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1863)mailnews/compose/src/nsMsgCompUtils.cpp:1980 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1864)mailnews/compose/src/nsMsgCompUtils.cpp:1691 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1865)mailnews/compose/src/nsMsgSend.cpp:703 Medium: srand: Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
r1866)mailnews/compose/src/nsMsgSend.cpp:135 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1867)mailnews/compose/src/nsMsgSend.cpp:147 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1868)mailnews/compose/src/nsMsgSend.cpp:1810 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1869)mailnews/compose/src/nsMsgSend.cpp:4060 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1870)mailnews/compose/src/nsMsgSend.cpp:4061 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1871)mailnews/compose/src/nsMsgSend.cpp:2643 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1872)mailnews/compose/src/nsMsgSend.cpp:2645 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1873)mailnews/compose/src/nsMsgSend.cpp:3146 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1874)mailnews/compose/src/nsMsgSend.cpp:4197 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1875)mailnews/compose/src/nsMsgSend.cpp:4199 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1876)mailnews/compose/src/nsMsgSend.cpp:3256 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1877)mailnews/compose/src/nsMsgSend.cpp:3262 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1878)mailnews/compose/src/nsMsgSend.cpp:3268 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1879)mailnews/compose/src/nsMsgSend.cpp:4040 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1880)mailnews/compose/src/nsMsgSend.cpp:4042 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1881)mailnews/compose/src/nsMsgSendPart.cpp:4242 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1882)mailnews/compose/src/nsMsgSendPart.cpp:4263 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1883)mailnews/compose/src/nsMsgSendPart.cpp:4335 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1884)mailnews/compose/src/nsMsgSendPart.cpp:4411 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1885)mailnews/compose/src/nsMsgSendPart.cpp:175 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1886)mailnews/compose/src/nsMsgSendPart.cpp:176 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1887)mailnews/compose/src/nsMsgSendPart.cpp:569 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1888)mailnews/compose/src/nsMsgSendPart.cpp:573 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1889)mailnews/compose/src/nsMsgSendPart.cpp:610 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1890)mailnews/compose/src/nsSmtpProtocol.cpp:512 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1891)mailnews/compose/src/nsSmtpProtocol.cpp:751 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r1892)mailnews/compose/src/nsSmtpProtocol.cpp:140 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1893)mailnews/compose/src/nsMsgAppleCodes.h:841 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1894)mailnews/compose/src/nsMsgAppleCodes.h:874 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1895)mailnews/compose/src/nsMsgAppleCodes.h:940 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1896)mailnews/compose/src/nsMsgAppleCodes.h:958 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1897)mailnews/compose/src/nsMsgAppleCodes.h:1112 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1898)mailnews/compose/src/nsMsgAppleDouble.h:62 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1899)mailnews/compose/src/nsMsgBinHex.h:67 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1900)mailnews/compose/src/nsMsgBinHex.h:77 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1901)mailnews/compose/src/nsMsgBinHex.h:154 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1902)mailnews/compose/src/nsMsgBinHex.h:169 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1903)mailnews/compose/src/nsMsgCompFields.h:78 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1904)mailnews/compose/src/nsMsgCompFields.h:80 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1905)mailnews/compose/src/nsMsgCompFields.h:81 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1906)mailnews/compose/src/nsMsgCompFields.h:85 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1907)mailnews/compose/src/nsMsgCompFields.h:97 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1908)mailnews/compose/src/nsMsgCompFields.h:123 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1909)mailnews/compose/src/nsMsgCompFields.h:136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1910)mailnews/compose/src/nsMsgSendPart.h:171 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1911)mailnews/db/msgdb/src/nsMailDatabase.cpp:108 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1912)mailnews/db/msgdb/src/nsMsgDatabase.cpp:357 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1914)mailnews/db/msgdb/src/nsMsgDatabase.cpp:3028 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1915)mailnews/db/msgdb/src/nsMsgDatabase.cpp:3234 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1916)mailnews/extensions/bayesian-spam-filter/src/nsBayesianFilter.cpp:903 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1917)mailnews/extensions/mdn/src/nsMsgMdnGenerator.cpp:324 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1918)mailnews/extensions/mdn/src/nsMsgMdnGenerator.cpp:381 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1919)mailnews/extensions/mdn/src/nsMsgMdnGenerator.cpp:774 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1920)mailnews/extensions/mdn/src/nsMsgMdnGenerator.cpp:789 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1921)mailnews/extensions/mdn/src/nsMsgMdnGenerator.cpp:848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1922)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:506 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1923)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:521 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1924)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:571 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1925)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:586 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1926)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:598 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1927)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:600 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1928)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:603 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1929)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:606 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1930)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:611 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1931)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:614 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1932)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:618 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1933)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:624 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1934)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:671 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1935)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:688 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1936)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:691 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1937)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:694 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1938)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:697 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1939)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:710 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1940)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:722 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1941)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:734 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1942)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:741 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1943)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:743 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1944)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:746 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1945)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:763 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1946)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:766 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1947)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:769 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1948)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:772 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1949)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:784 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1950)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:92 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1951)mailnews/extensions/palmsync/conduit/MozABConduitSync.cpp:203 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1952)mailnews/extensions/palmsync/conduit/MozABHHManager.cpp:318 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1953)mailnews/extensions/palmsync/conduit/MozABHHManager.cpp:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1954)mailnews/extensions/palmsync/conduit/MozABHHManager.cpp:449 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1955)mailnews/extensions/palmsync/conduit/MozABHHManager.cpp:194 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1956)mailnews/extensions/palmsync/conduit/MozABHHManager.cpp:329 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1957)mailnews/extensions/palmsync/conduit/MozABHHManager.h:425 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1958)mailnews/extensions/palmsync/conduit/MozABHHManager.h:552 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r1959)mailnews/extensions/palmsync/src/nsAbIPCCard.cpp:83 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1960)mailnews/extensions/palmsync/src/nsAbIPCCard.cpp:681 High: wcscpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1961)mailnews/extensions/palmsync/src/nsAbIPCCard.cpp:685 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1962)mailnews/extensions/palmsync/src/nsAbIPCCard.cpp:748 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1963)mailnews/extensions/palmsync/src/nsAbPalmSync.cpp:689 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1964)mailnews/extensions/palmsync/src/nsAbPalmSync.cpp:749 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1965)mailnews/extensions/palmsync/src/PalmSyncImp.cpp:166 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1966)mailnews/extensions/palmsync/src/PalmSyncImp.cpp:780 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1967)mailnews/extensions/palmsync/src/Registry.cpp:149 High: wcscpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1968)mailnews/extensions/palmsync/src/Registry.cpp:129 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1969)mailnews/extensions/palmsync/src/Registry.cpp:157 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1970)mailnews/extensions/palmsync/src/Registry.cpp:192 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1971)mailnews/extensions/palmsync/src/Registry.cpp:230 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1972)mailnews/extensions/palmsync/src/Registry.cpp:231 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1973)mailnews/extensions/palmsync/src/Registry.cpp:283 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1974)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:176 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1975)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:211 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r1976)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1977)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:593 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1978)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:699 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1979)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:782 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1980)mailnews/extensions/smime/src/nsMsgComposeSecure.cpp:1060 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1981)mailnews/imap/src/nsImapFlagAndUidState.cpp:161 Medium: srand: Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
r1982)mailnews/imap/src/nsImapFlagAndUidState.cpp:381 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1983)mailnews/imap/src/nsImapMailFolder.cpp:383 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1984)mailnews/imap/src/nsImapMailFolder.cpp:5530 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1985)mailnews/imap/src/nsIMAPNamespace.cpp:6568 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1986)mailnews/imap/src/nsImapProtocol.cpp:425 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1987)mailnews/imap/src/nsImapProtocol.cpp:3110 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1988)mailnews/imap/src/nsImapProtocol.cpp:5759 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1989)mailnews/imap/src/nsImapProtocol.cpp:3705 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1990)mailnews/imap/src/nsImapProtocol.cpp:4378 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r1991)mailnews/imap/src/nsImapServerResponseParser.cpp:4761 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1992)mailnews/imap/src/nsImapServerResponseParser.cpp:4794 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1993)mailnews/imap/src/nsImapServerResponseParser.cpp:4926 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r1994)mailnews/imap/src/nsImapServerResponseParser.cpp:322 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r1995)mailnews/imap/src/nsImapService.cpp:1185 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.