r2023)mailnews/imap/src/nsImapService.cpp:2464 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2024)mailnews/imap/src/nsImapService.cpp:2480 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2025)mailnews/imap/src/nsImapService.cpp:2498 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2026)mailnews/imap/src/nsImapService.cpp:2514 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2027)mailnews/imap/src/nsImapService.cpp:2527 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2028)mailnews/imap/src/nsImapService.cpp:2539 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2029)mailnews/imap/src/nsImapService.cpp:2553 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2030)mailnews/imap/src/nsImapService.cpp:2587 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2031)mailnews/imap/src/nsImapService.cpp:2610 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2032)mailnews/imap/src/nsImapService.cpp:2632 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2033)mailnews/imap/src/nsImapService.cpp:2652 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2034)mailnews/imap/src/nsImapService.cpp:2676 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2035)mailnews/imap/src/nsImapService.cpp:2696 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2036)mailnews/imap/src/nsImapService.cpp:2715 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2037)mailnews/imap/src/nsImapService.cpp:2734 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2038)mailnews/imap/src/nsImapService.cpp:2750 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2039)mailnews/imap/src/nsImapService.cpp:2771 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2041)mailnews/imap/src/nsImapService.cpp:2810 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2043)mailnews/imap/src/nsImapService.cpp:2868 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2044)mailnews/imap/src/nsImapService.cpp:2893 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2045)mailnews/imap/src/nsImapService.cpp:2920 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2046)mailnews/imap/src/nsImapService.cpp:2934 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2047)mailnews/imap/src/nsImapService.cpp:2950 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2048)mailnews/imap/src/nsImapService.cpp:2965 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2049)mailnews/imap/src/nsImapService.cpp:2989 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2050)mailnews/imap/src/nsImapUrl.cpp:2575 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2051)mailnews/imap/src/nsImapUrl.cpp:2582 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2052)mailnews/imap/src/nsImapUrl.cpp:841 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2053)mailnews/imap/src/nsImapUrl.cpp:842 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2054)mailnews/imap/src/nsImapProtocol.h:1400 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2055)mailnews/import/eudora/src/nsEudoraAddress.cpp:509 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2056)mailnews/import/eudora/src/nsEudoraImport.cpp:106 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2057)mailnews/import/eudora/src/nsEudoraImport.cpp:214 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2058)mailnews/import/eudora/src/nsEudoraMac.cpp:431 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2059)mailnews/import/eudora/src/nsEudoraMac.cpp:446 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2060)mailnews/import/eudora/src/nsEudoraMac.cpp:660 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2061)mailnews/import/eudora/src/nsEudoraMailbox.cpp:1046 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2062)mailnews/import/eudora/src/nsEudoraWin32.cpp:751 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2063)mailnews/import/eudora/src/nsEudoraWin32.cpp:884 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2064)mailnews/import/eudora/src/nsEudoraCompose.h:719 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2065)mailnews/import/eudora/src/nsEudoraCompose.h:781 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2066)mailnews/import/eudora/src/nsEudoraCompose.h:1071 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2067)mailnews/import/eudora/src/nsEudoraCompose.h:1250 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2068)mailnews/import/oexpress/nsOE5File.cpp:60 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2069)mailnews/import/oexpress/nsOEImport.cpp:54 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2070)mailnews/import/oexpress/nsOEImport.cpp:68 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2071)mailnews/import/oexpress/nsOEImport.cpp:104 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2072)mailnews/import/oexpress/nsOEImport.cpp:265 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2073)mailnews/import/oexpress/nsOEMailbox.cpp:408 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2074)mailnews/import/oexpress/nsOEMailbox.cpp:423 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2075)mailnews/import/oexpress/nsOEMailbox.cpp:710 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2076)mailnews/import/oexpress/nsOEScanBoxes.cpp:613 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2077)mailnews/import/oexpress/WabObject.cpp:374 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2078)mailnews/import/oexpress/WabObject.cpp:894 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2079)mailnews/import/oexpress/WabObject.cpp:915 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2080)mailnews/import/oexpress/WabObject.cpp:146 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2081)mailnews/import/outlook/src/MapiApi.cpp:157 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2082)mailnews/import/outlook/src/MapiApi.cpp:432 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2083)mailnews/import/outlook/src/MapiApi.cpp:476 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2084)mailnews/import/outlook/src/MapiApi.cpp:150 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2085)mailnews/import/outlook/src/MapiApi.cpp:156 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2086)mailnews/import/outlook/src/MapiMessage.cpp:1095 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2087)mailnews/import/outlook/src/MapiMessage.cpp:1141 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2088)mailnews/import/outlook/src/MapiMessage.cpp:1365 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2089)mailnews/import/outlook/src/MapiMessage.cpp:1432 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2090)mailnews/import/outlook/src/MapiMessage.cpp:1595 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2091)mailnews/import/outlook/src/MapiMessage.cpp:598 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2092)mailnews/import/outlook/src/nsOutlookImport.cpp:602 High: GetTempPath: GetTempPath() may return the current directory or the windows directory. Be careful what you place in these locations. Important files may be overwritten, and trojan DLL's may be dropped in these locations. Never use a user-input filename when writing to a location given by GetTempPath().
r2093)mailnews/import/outlook/src/nsOutlookCompose.h:411 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2094)mailnews/import/outlook/src/nsOutlookCompose.h:426 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2095)mailnews/import/outlook/src/nsOutlookCompose.h:666 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2096)mailnews/import/src/nsImportAddressBooks.cpp:58 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2097)mailnews/import/src/nsImportMail.cpp:848 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2098)mailnews/import/src/ImportCharSet.h:626 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2099)mailnews/import/text/src/nsTextAddress.cpp:83 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2100)mailnews/import/text/src/nsTextAddress.cpp:84 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2101)mailnews/import/text/src/nsTextImport.cpp:114 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2102)mailnews/import/text/src/nsTextImport.cpp:422 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2103)mailnews/import/text/src/nsTextImport.cpp:562 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2104)mailnews/import/text/src/nsTextImport.cpp:575 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2105)mailnews/import/text/src/nsTextImport.cpp:895 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2106)mailnews/import/text/src/nsTextImport.cpp:407 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2108)mailnews/local/src/nsLocalMailFolder.cpp:627 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2109)mailnews/local/src/nsLocalMailFolder.cpp:2270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2110)mailnews/local/src/nsLocalMailFolder.cpp:2288 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2111)mailnews/local/src/nsLocalUtils.cpp:2304 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2112)mailnews/local/src/nsMovemailService.cpp:156 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2113)mailnews/local/src/nsMovemailService.cpp:176 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2114)mailnews/local/src/nsParseMailbox.cpp:478 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2115)mailnews/local/src/nsParseMailbox.cpp:489 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2116)mailnews/local/src/nsParseMailbox.cpp:494 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2117)mailnews/local/src/nsParseMailbox.cpp:840 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2118)mailnews/local/src/nsParseMailbox.cpp:1165 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2119)mailnews/local/src/nsParseMailbox.cpp:1166 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2120)mailnews/local/src/nsParseMailbox.cpp:2244 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2121)mailnews/local/src/nsPop3Protocol.cpp:1863 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2122)mailnews/local/src/nsPop3Protocol.cpp:274 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2123)mailnews/local/src/nsPop3Protocol.cpp:1355 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2124)mailnews/local/src/nsPop3Protocol.cpp:2050 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2125)mailnews/local/src/nsPop3Protocol.cpp:2072 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2126)mailnews/local/src/nsPop3Protocol.cpp:2117 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2127)mailnews/local/src/nsPop3Protocol.cpp:2528 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2128)mailnews/local/src/nsPop3Sink.cpp:581 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2129)mailnews/local/src/nsPop3Sink.cpp:2423 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2130)mailnews/local/src/nsPop3Sink.cpp:2969 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2131)mailnews/local/src/nsPop3Sink.cpp:3051 High: smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2132)mailnews/local/src/nsPop3Sink.cpp:333 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2133)mailnews/local/src/nsPop3Sink.cpp:397 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2134)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:410 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2135)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:411 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2136)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:68 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2137)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:213 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2138)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:320 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2139)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:344 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2140)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:367 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2141)mailnews/mapi/mapihook/src/nsMapiRegistryUtils.cpp:434 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2142)mailnews/mapi/mapihook/src/Registry.cpp:327 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2143)mailnews/mapi/mapihook/src/Registry.cpp:351 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2144)mailnews/mapi/mapihook/src/Registry.cpp:128 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2145)mailnews/mapi/mapihook/src/Registry.cpp:156 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2146)mailnews/mapi/mapihook/src/Registry.cpp:191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2147)mailnews/mapi/mapihook/src/Registry.cpp:229 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2148)mailnews/mapi/mapihook/src/Registry.cpp:230 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2149)mailnews/mapi/mapihook/src/Registry.cpp:294 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2150)mailnews/mapi/old/hook/mapihook.cpp:175 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2151)mailnews/mapi/old/hook/mapihook.cpp:210 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2152)mailnews/mapi/old/hook/mapihook.cpp:986 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2157)mailnews/mapi/old/hook/mapimail.cpp:1137 Medium: GetTempFileName: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r2158)mailnews/mapi/old/hook/mapimail.cpp:1170 Medium: GetTempFileName: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r2159)mailnews/mapi/old/hook/mapimail.cpp:141 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2160)mailnews/mapi/old/hook/mapimail.cpp:142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2161)mailnews/mapi/old/hook/mapimail.cpp:143 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2162)mailnews/mapi/old/hook/mapimail.cpp:624 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2163)mailnews/mapi/old/hook/mapimail.cpp:625 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2164)mailnews/mapi/old/hook/mapimail.cpp:626 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2165)mailnews/mapi/old/lib/nsstrseq.cpp:176 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2166)mailnews/mapi/old/lib/nsstrseq.cpp:677 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2167)mailnews/mapi/old/mapi32/mapi32.cpp:119 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2168)mailnews/mapi/old/mapi32/mapiutl.cpp:963 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2169)mailnews/mapi/old/mapi32/mapiutl.cpp:72 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2170)mailnews/mapi/old/mapi32/mapiutl.cpp:122 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2177)mailnews/mapi/old/mapi32/mapiutl.cpp:83 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2178)mailnews/mapi/old/mapi32/mapiutl.cpp:791 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2179)mailnews/mapi/old/mapi32/mapiutl.cpp:248 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2181)mailnews/mapi/old/mapi32/mapiutl.cpp:371 Medium: GetTempFileName: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r2182)mailnews/mapi/old/mapi32/mapiutl.cpp:388 Medium: GetTempFileName: Many calls for generating temporary file names are insecure (susceptible to race conditions). Use a securely generated file name, for example, by pulling 64 bits of randomness from /dev/random, base 64 encoding it and using that as a file suffix.
r2183)mailnews/mapi/old/mapi32/xpapi.cpp:526 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r2184)mailnews/mapi/old/mapi32/xpapi.cpp:619 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r2185)mailnews/mapi/old/mapi32/xpapi.cpp:58 High: CreateProcess: Many program execution commands under Windows will search the path for a program if you do not explicitly specify a full path to the file. This can allow trojans to be executed instead. Also, be sure to specify a file extension, since otherwise multiple extensions will be tried by the operating system, providing another opportunity for trojans.
r2186)mailnews/mapi/old/mapi32/xpapi.cpp:64 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2187)mailnews/mapi/old/mapi32/xpapi.cpp:211 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2188)mailnews/mapi/old/mapi32/xpapi.cpp:212 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2189)mailnews/mapi/old/mapi32/xpapi.cpp:311 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2190)mailnews/mapi/old/mapi32/xpapi.cpp:65 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2191)mailnews/mapi/old/mapi32/xpapi.cpp:251 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2192)mailnews/mapi/old/mapi32/xpapi.cpp:67 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2193)mailnews/mapi/old/mapi32/xpapi.cpp:68 High: WinExec: Many program execution commands under Windows will search the path for a program if you do not explicitly specify a full path to the file. This can allow trojans to be executed instead. Also, be sure to specify a file extension, since otherwise multiple extensions will be tried by the operating system, providing another opportunity for trojans.
r2194)mailnews/mapi/old/mapi32/xpapi.cpp:224 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2195)mailnews/mapi/old/mapi32/xpapi.cpp:268 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2196)mailnews/mapi/old/mapi32/port.h:224 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2197)mailnews/mapi/old/mapi32/port.h:268 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2260)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:170 High: EnterCriticalSection: This function can throw exceptions in low memory conditions. Use InitialCriticalSectionAndSpinCount instead.
r2261)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:308 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2262)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:351 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2263)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:356 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2264)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:361 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2265)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:416 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2266)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:421 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2267)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:426 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2268)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:431 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2269)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:474 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2270)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:479 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2271)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:1815 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2272)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:512 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2273)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:556 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2274)mailnews/mime/cthandlers/vcard/mimevcrd.cpp:700 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2275)mailnews/mime/cthandlers/vcard/nsVCard.cpp:1204 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2276)mailnews/mime/cthandlers/vcard/nsVCard.cpp:1218 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2277)mailnews/mime/cthandlers/vcard/nsVCard.cpp:947 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2278)mailnews/mime/cthandlers/vcard/nsVCard.cpp:1246 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2279)mailnews/mime/cthandlers/vcard/nsVCard.cpp:1266 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2282)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:586 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2283)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1134 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2284)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1297 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2285)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1303 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2286)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2287)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1352 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2288)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1353 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2289)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1355 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2290)mailnews/mime/cthandlers/vcard/nsVCardObj.cpp:1358 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2291)mailnews/mime/emitters/src/nsMimeHtmlEmitter.cpp:1357 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2292)mailnews/mime/emitters/src/nsMimeXmlEmitter.cpp:318 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2293)mailnews/mime/src/comi18n.cpp:70 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2294)mailnews/mime/src/comi18n.cpp:191 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2295)mailnews/mime/src/comi18n.cpp:156 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2296)mailnews/mime/src/comi18n.cpp:285 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2297)mailnews/mime/src/comi18n.cpp:775 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2298)mailnews/mime/src/comi18n.cpp:1005 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2299)mailnews/mime/src/comi18n.cpp:1179 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2300)mailnews/mime/src/mimecms.cpp:412 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2301)mailnews/mime/src/mimecms.cpp:432 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2302)mailnews/mime/src/mimecms.cpp:481 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2303)mailnews/mime/src/mimecms.cpp:786 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2304)mailnews/mime/src/mimedrft.cpp:618 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2305)mailnews/mime/src/mimedrft.cpp:693 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2306)mailnews/mime/src/mimedrft.cpp:1485 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2307)mailnews/mime/src/mimeebod.cpp:1450 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2308)mailnews/mime/src/mimeebod.cpp:191 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2309)mailnews/mime/src/mimeebod.cpp:193 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2310)mailnews/mime/src/mimeebod.cpp:196 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2311)mailnews/mime/src/mimeebod.cpp:224 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2312)mailnews/mime/src/mimeebod.cpp:243 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2313)mailnews/mime/src/mimeebod.cpp:253 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2314)mailnews/mime/src/mimeebod.cpp:260 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2315)mailnews/mime/src/mimeebod.cpp:263 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2316)mailnews/mime/src/mimeebod.cpp:440 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2317)mailnews/mime/src/mimeebod.cpp:441 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2318)mailnews/mime/src/mimeenc.cpp:400 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2319)mailnews/mime/src/mimeenc.cpp:439 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2320)mailnews/mime/src/mimeeobj.cpp:58 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2321)mailnews/mime/src/mimeeobj.cpp:63 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2322)mailnews/mime/src/mimeeobj.cpp:79 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2323)mailnews/mime/src/mimeeobj.cpp:248 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2324)mailnews/mime/src/mimeeobj.cpp:633 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2325)mailnews/mime/src/mimeeobj.cpp:637 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2326)mailnews/mime/src/mimeeobj.cpp:688 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2327)mailnews/mime/src/mimeeobj.cpp:714 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2328)mailnews/mime/src/mimeeobj.cpp:781 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2329)mailnews/mime/src/mimeeobj.cpp:886 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2330)mailnews/mime/src/mimeeobj.cpp:1037 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2331)mailnews/mime/src/mimeeobj.cpp:174 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2332)mailnews/mime/src/mimefilt.cpp:175 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2334)mailnews/mime/src/mimefilt.cpp:210 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2335)mailnews/mime/src/mimefilt.cpp:211 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2336)mailnews/mime/src/mimefilt.cpp:212 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2337)mailnews/mime/src/mimefilt.cpp:224 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2338)mailnews/mime/src/mimefilt.cpp:301 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2339)mailnews/mime/src/mimefilt.cpp:341 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2340)mailnews/mime/src/mimefilt.cpp:352 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2341)mailnews/mime/src/mimefilt.cpp:371 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2348)mailnews/mime/src/mimei.cpp:980 High: popen: Argument 1 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r2349)mailnews/mime/src/mimei.cpp:100 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2350)mailnews/mime/src/mimei.cpp:199 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2351)mailnews/mime/src/mimei.cpp:928 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2352)mailnews/mime/src/mimei.cpp:1259 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2353)mailnews/mime/src/mimei.cpp:1301 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2354)mailnews/mime/src/mimei.cpp:1620 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2355)mailnews/mime/src/mimemcms.cpp:930 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2356)mailnews/mime/src/mimemcms.cpp:1266 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2357)mailnews/mime/src/mimemcms.cpp:1269 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2358)mailnews/mime/src/mimemcms.cpp:1303 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2359)mailnews/mime/src/mimemcms.cpp:1305 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2360)mailnews/mime/src/mimemcms.cpp:1621 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2361)mailnews/mime/src/mimemoz2.cpp:313 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2362)mailnews/mime/src/mimemoz2.cpp:438 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2363)mailnews/mime/src/mimemrel.cpp:1201 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2364)mailnews/mime/src/mimemrel.cpp:1202 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2365)mailnews/mime/src/mimemrel.cpp:1203 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2366)mailnews/mime/src/mimemsg.cpp:1067 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2367)mailnews/mime/src/mimepbuf.cpp:234 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2368)mailnews/mime/src/mimethtm.cpp:315 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2369)mailnews/mime/src/mimetric.cpp:78 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2370)mailnews/mime/src/mimeunty.cpp:310 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2371)mailnews/mime/src/mimeunty.cpp:315 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2372)mailnews/mime/src/mimeunty.cpp:301 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2373)mailnews/mime/src/mimeunty.cpp:309 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2374)mailnews/mime/src/mimeunty.cpp:318 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2375)mailnews/mime/src/mimeunty.cpp:326 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2376)mailnews/mime/src/mimeunty.cpp:334 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2377)mailnews/mime/src/nsMsgHeaderParser.cpp:302 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2378)mailnews/mime/src/nsMsgHeaderParser.cpp:303 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2379)mailnews/mime/src/nsMsgHeaderParser.cpp:310 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2380)mailnews/mime/src/nsMsgHeaderParser.cpp:311 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2381)mailnews/mime/src/nsMsgHeaderParser.cpp:319 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2382)mailnews/mime/src/nsMsgHeaderParser.cpp:320 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2383)mailnews/mime/src/nsMsgHeaderParser.cpp:327 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2384)mailnews/mime/src/nsMsgHeaderParser.cpp:328 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2385)mailnews/mime/src/nsStreamConverter.cpp:1612 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2386)mailnews/mime/src/nsStreamConverter.cpp:1619 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2387)mailnews/mime/src/nsStreamConverter.cpp:1660 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2388)mailnews/mime/src/nsStreamConverter.cpp:1671 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2389)mailnews/movemail/src/movemail.c:903 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2390)mailnews/movemail/src/movemail.c:94 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2391)mailnews/movemail/src/movemail.c:129 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2392)mailnews/movemail/src/movemail.c:130 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2393)mailnews/movemail/src/movemail.c:131 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2394)mailnews/movemail/src/movemail.c:132 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2395)mailnews/movemail/src/movemail.c:133 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2397)mailnews/movemail/src/movemail.c:291 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2400)mailnews/news/src/nsNewsDownloader.cpp:241 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 244 (unlink)
r2401)mailnews/news/src/nsNNTPNewsgroupPost.cpp:287 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2402)mailnews/news/src/nsNNTPNewsgroupPost.cpp:94 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2403)mailnews/news/src/nsNNTPProtocol.cpp:95 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2404)mailnews/news/src/nsNNTPProtocol.cpp:96 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2405)mailnews/news/src/nsNNTPProtocol.cpp:343 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2406)mailnews/news/src/nsNNTPProtocol.cpp:2008 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2407)mailnews/news/src/nsNNTPProtocol.cpp:2291 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2408)mailnews/news/src/nsNNTPProtocol.cpp:2372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2409)mailnews/news/src/nsNNTPProtocol.cpp:2422 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2410)mailnews/news/src/nsNNTPProtocol.cpp:3232 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2411)mailnews/news/src/nsNNTPProtocol.cpp:3458 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2412)mailnews/news/src/nsNNTPProtocol.cpp:3596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2413)mailnews/news/src/nsNNTPProtocol.cpp:4022 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2414)mailnews/news/src/nsNNTPProtocol.cpp:4549 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2415)mailnews/news/src/nsNNTPProtocol.cpp:4634 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2416)mailnews/news/src/nsNNTPProtocol.cpp:4700 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2417)mailnews/news/src/nsNNTPProtocol.cpp:4777 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2418)mailnews/news/src/nsNNTPProtocol.cpp:3774 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2419)mailnews/news/src/nsNNTPProtocol.cpp:3816 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2420)mailnews/news/src/nsNNTPProtocol.cpp:4345 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2421)mailnews/news/src/nsNNTPProtocol.cpp:4348 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2422)mailnews/news/src/nsNNTPProtocol.cpp:4349 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2423)mailnews/news/src/nsNNTPProtocol.cpp:4352 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2424)mailnews/news/src/nsNNTPProtocol.cpp:4353 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2425)mailnews/news/src/nsNNTPProtocol.cpp:4357 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2426)mailnews/news/src/nsNNTPProtocol.cpp:4358 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2427)mailnews/news/src/nsNNTPProtocol.cpp:4372 High: PR_smprintf: Check to be sure that the non-constant format string passed as argument 1 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2428)mailnews/news/src/nsNNTPNewsgroupPost.h:4702 High: PR_sscanf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2429)modules/libimg/png/png.c:121 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2430)modules/libimg/png/png.c:619 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2431)modules/libimg/png/png.c:642 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2432)modules/libimg/png/png.c:632 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2433)modules/libimg/png/pngerror.c:632 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2434)modules/libimg/png/pnggccrd.c:35 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2435)modules/libimg/png/pnggccrd.c:148 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2436)modules/libimg/png/pnggccrd.c:156 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2437)modules/libimg/png/pnggccrd.c:174 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2438)modules/libimg/png/pnggccrd.c:228 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2439)modules/libimg/png/pngread.c:5066 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2440)modules/libimg/png/pngrtran.c:109 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2441)modules/libimg/png/pngrtran.c:185 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2442)modules/libimg/png/pngrutil.c:1172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2443)modules/libimg/png/pngvcrd.c:270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2444)modules/libimg/png/pngvcrd.c:310 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2445)modules/libimg/png/pngwutil.c:3651 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2447)modules/libimg/png/pngwutil.c:1152 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2448)modules/libimg/png/pngwutil.c:1288 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2450)modules/libimg/png/pngwutil.c:1545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2451)modules/libimg/png/pngwutil.c:1516 High: swprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2452)modules/libimg/png/pngwutil.c:1518 High: swprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2453)modules/libjar/nsZipArchive.cpp:1516 High: swprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2454)modules/libjar/nsZipArchive.cpp:1518 High: swprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2455)modules/libjar/nsZipArchive.cpp:298 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2456)modules/libjar/zipstruct.h:833 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2457)modules/libjar/zipstruct.h:1034 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2458)modules/libjar/zipstruct.h:1228 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2459)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:38 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2460)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:39 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2461)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:40 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2462)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:41 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2463)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:42 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2464)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:43 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2465)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:44 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2466)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:45 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2467)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:46 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2468)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:47 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2469)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:48 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2470)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:60 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2471)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:61 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2472)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:62 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2473)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:63 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2474)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:64 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2475)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:65 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2476)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:66 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2477)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:67 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2478)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:68 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2479)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:69 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2480)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:70 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2481)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:71 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2482)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:72 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2483)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:73 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2484)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:74 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2485)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:75 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2486)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:76 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2487)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:88 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2488)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:89 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2489)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:90 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2490)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:91 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2491)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:92 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2492)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:93 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2493)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:94 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2494)modules/libpr0n/decoders/bmp/nsBMPDecoder.h:95 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2495)modules/libpr0n/decoders/bmp/nsICODecoder.h:57 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2496)modules/libpr0n/decoders/bmp/nsICODecoder.h:150 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2497)modules/libpr0n/decoders/jpeg/nsJPEGDecoder.cpp:110 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2498)modules/libpr0n/decoders/jpeg/nsJPEGDecoder.cpp:113 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2499)modules/libpr0n/decoders/ppm/nsPPMDecoder.h:605 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2500)modules/libpr0n/decoders/xbm/nsXBMDecoder.cpp:67 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2501)modules/libpr0n/decoders/xbm/nsXBMDecoder.cpp:163 High: sscanf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2502)modules/libpref/src/nsPref.cpp:147 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r2503)modules/libpref/src/nsPref.cpp:578 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2504)modules/libpref/src/prefapi.cpp:608 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2505)modules/libpref/src/prefapi.cpp:205 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2508)modules/libpref/src/prefapi.cpp:1228 High: PR_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2509)modules/libpref/src/prefapi.cpp:1249 High: PR_sprintf_append: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2511)modules/libreg/src/reg.c:756 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2512)modules/libreg/src/reg.c:826 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2513)modules/libreg/src/reg.c:932 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2514)modules/libreg/src/reg.c:1020 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2515)modules/libreg/src/reg.c:1058 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2516)modules/libreg/src/reg.c:1545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2517)modules/libreg/src/reg.c:1627 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2518)modules/libreg/src/reg.c:1963 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2519)modules/libreg/src/reg.c:3801 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2520)modules/libreg/src/reg.c:3835 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2521)modules/libreg/src/reg.c:3836 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2522)modules/libreg/src/reg.c:3927 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2523)modules/libreg/src/reg.c:3928 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2525)modules/libreg/src/VerReg.c:3811 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 3810 (remove), 3818 (remove)
r2526)modules/libreg/src/VerReg.c:158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2527)modules/libreg/src/VerReg.c:460 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2528)modules/libreg/src/VerReg.c:510 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2529)modules/libreg/src/VerReg.c:511 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2530)modules/libreg/src/VerReg.c:781 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2531)modules/libreg/src/VerReg.c:987 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2532)modules/libreg/src/VerReg.c:992 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2533)modules/libreg/src/VerReg.c:1080 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2534)modules/libreg/src/VerReg.c:1120 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2535)modules/libreg/src/VerReg.c:1475 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2536)modules/libreg/src/VerReg.c:1771 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2537)modules/libreg/src/VerReg.c:1772 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2538)modules/libreg/src/VerReg.c:396 Medium: read: Check buffer boundaries if calling this function in a loop and make sure you are not in danger of writing past the allocated space.
r2539)modules/libreg/src/vr_stubs.c:1023 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 368 (open)
r2540)modules/libreg/src/vr_stubs.c:124 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2541)modules/libreg/src/vr_stubs.c:181 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2542)modules/libreg/src/vr_stubs.c:194 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2543)modules/libreg/src/vr_stubs.c:721 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2544)modules/libreg/src/vr_stubs.c:749 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2554)modules/oji/src/lcglue.cpp:218 High: gets: Gets is unsafe!! No bounds checking is performed, buffer is easily overflowable by user. Use fgets(buf, size, stdin) instead.
r2555)modules/oji/src/nsJVMManager.cpp:351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2556)modules/oji/src/nsJVMManager.cpp:459 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2557)modules/oji/src/nsJVMManager.cpp:460 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2558)modules/oji/src/nsJVMManager.cpp:476 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2559)modules/oji/src/nsJVMManager.cpp:477 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2566)modules/plugin/base/src/ns4xPlugin.cpp:127 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 132 (fopen)
r2567)modules/plugin/base/src/ns4xPlugin.cpp:332 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2568)modules/plugin/base/src/ns4xPlugin.cpp:506 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2569)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:507 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2570)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:230 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2571)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:231 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2572)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:236 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2573)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:275 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2574)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:276 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2575)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:277 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2576)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:325 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2577)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:359 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2578)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:394 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2579)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:395 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2580)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:396 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2581)modules/plugin/base/src/nsPluginDirServiceProvider.cpp:243 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2582)modules/plugin/base/src/nsPluginHostImpl.cpp:296 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2583)modules/plugin/base/src/nsPluginHostImpl.cpp:421 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2584)modules/plugin/base/src/nsPluginHostImpl.cpp:364 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2585)modules/plugin/base/src/nsPluginHostImpl.cpp:871 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2586)modules/plugin/base/src/nsPluginHostImpl.cpp:893 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2587)modules/plugin/base/src/nsPluginHostImpl.cpp:900 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2588)modules/plugin/base/src/nsPluginHostImpl.cpp:907 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2589)modules/plugin/base/src/nsPluginHostImpl.cpp:937 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2590)modules/plugin/base/src/nsPluginHostImpl.cpp:944 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2591)modules/plugin/base/src/nsPluginHostImpl.cpp:974 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2592)modules/plugin/base/src/nsPluginHostImpl.cpp:1025 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2593)modules/plugin/base/src/nsPluginHostImpl.cpp:1026 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2594)modules/plugin/base/src/nsPluginHostImpl.cpp:1027 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2595)modules/plugin/base/src/nsPluginHostImpl.cpp:2352 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2596)modules/plugin/base/src/nsPluginHostImpl.cpp:2890 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2597)modules/plugin/base/src/nsPluginHostImpl.cpp:3936 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2598)modules/plugin/base/src/nsPluginHostImpl.cpp:5388 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2599)modules/plugin/base/src/nsPluginHostImpl.cpp:5438 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2600)modules/plugin/base/src/nsPluginHostImpl.cpp:5444 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2601)modules/plugin/base/src/nsPluginHostImpl.cpp:6360 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2602)modules/plugin/base/src/nsPluginHostImpl.cpp:873 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2603)modules/plugin/base/src/nsPluginsDirBeOS.cpp:2904 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2604)modules/plugin/base/src/nsPluginsDirDarwin.cpp:209 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2605)modules/plugin/base/src/nsPluginsDirDarwin.cpp:215 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2606)modules/plugin/base/src/nsPluginsDirMac.cpp:79 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2607)modules/plugin/base/src/nsPluginsDirMac.cpp:193 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2608)modules/plugin/base/src/nsPluginsDirMac.cpp:261 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2609)modules/plugin/base/src/nsPluginsDirMac.cpp:262 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2610)modules/plugin/base/src/nsPluginsDirMac.cpp:263 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2611)modules/plugin/base/src/nsPluginsDirOS2.cpp:83 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2612)modules/plugin/base/src/nsPluginsDirOS2.cpp:180 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2613)modules/plugin/base/src/nsPluginsDirOS2.cpp:317 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2614)modules/plugin/base/src/nsPluginsDirOS2.cpp:318 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2615)modules/plugin/base/src/nsPluginsDirOS2.cpp:320 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2616)modules/plugin/base/src/nsPluginsDirUnix.cpp:169 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2617)modules/plugin/base/src/nsPluginsDirUnix.cpp:86 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2618)modules/plugin/base/src/nsPluginsDirUnix.cpp:108 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2619)modules/plugin/base/src/nsPluginsDirUnix.cpp:170 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2620)modules/plugin/base/src/nsPluginsDirUnix.cpp:182 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2621)modules/plugin/base/src/nsPluginsDirWin.cpp:109 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2622)modules/plugin/base/src/nsPluginsDirWin.cpp:219 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2623)modules/plugin/base/src/nsPluginManifestLineReader.h:226 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2624)modules/plugin/samples/4x-scriptable/plugin.cpp:60 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2625)modules/plugin/samples/4x-scriptable/plugin.h:64 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2626)modules/plugin/samples/4x-scriptable/plugin.h:137 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2627)modules/plugin/samples/4x-scriptable/plugin.h:168 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2628)modules/plugin/samples/backward/badapter.cpp:60 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2629)modules/plugin/samples/backward/badapter.cpp:467 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2630)modules/plugin/samples/default/mac/NullPlugin.cpp:1389 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2631)modules/plugin/samples/default/mac/NullPlugin.cpp:1393 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2636)modules/plugin/samples/default/os2/dbg.cpp:891 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2637)modules/plugin/samples/default/os2/dbg.cpp:49 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2638)modules/plugin/samples/default/os2/dbg.cpp:50 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2639)modules/plugin/samples/default/os2/dbg.cpp:54 High: vsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r2640)modules/plugin/samples/default/os2/dialogs.cpp:54 High: vsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2641)modules/plugin/samples/default/os2/plugin.cpp:80 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2642)modules/plugin/samples/default/os2/plugin.cpp:110 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2643)modules/plugin/samples/default/os2/plugin.cpp:117 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2644)modules/plugin/samples/default/os2/plugin.cpp:124 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2645)modules/plugin/samples/default/os2/plugin.cpp:131 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2646)modules/plugin/samples/default/os2/plugin.cpp:138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2647)modules/plugin/samples/default/os2/plugin.cpp:142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2648)modules/plugin/samples/default/os2/plugin.cpp:288 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2649)modules/plugin/samples/default/os2/plugin.cpp:307 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2650)modules/plugin/samples/default/os2/plugin.cpp:312 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2651)modules/plugin/samples/default/os2/plugin.cpp:330 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2652)modules/plugin/samples/default/os2/plugin.cpp:335 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2654)modules/plugin/samples/default/os2/plugin.cpp:447 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2656)modules/plugin/samples/default/os2/plugin.cpp:483 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2657)modules/plugin/samples/default/os2/plugin.cpp:501 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2658)modules/plugin/samples/default/os2/utils.cpp:119 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2659)modules/plugin/samples/default/os2/utils.cpp:126 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2660)modules/plugin/samples/default/os2/utils.cpp:133 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2661)modules/plugin/samples/default/os2/utils.cpp:144 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2662)modules/plugin/samples/default/os2/utils.cpp:291 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2663)modules/plugin/samples/default/os2/utils.cpp:310 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2664)modules/plugin/samples/default/os2/utils.cpp:333 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2665)modules/plugin/samples/default/os2/utils.cpp:453 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2666)modules/plugin/samples/default/os2/utils.cpp:61 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2667)modules/plugin/samples/default/os2/utils.cpp:125 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2668)modules/plugin/samples/default/unix/nullplugin.c:148 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2671)modules/plugin/samples/default/unix/nullplugin.c:84 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r2672)modules/plugin/samples/default/unix/nullplugin.c:175 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2673)modules/plugin/samples/default/windows/dbg.cpp:242 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2674)modules/plugin/samples/default/windows/dbg.cpp:48 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2675)modules/plugin/samples/default/windows/dialogs.cpp:49 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2676)modules/plugin/samples/default/windows/plugin.cpp:83 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2677)modules/plugin/samples/default/windows/plugin.cpp:131 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2678)modules/plugin/samples/default/windows/plugin.cpp:138 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2679)modules/plugin/samples/default/windows/plugin.cpp:145 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2680)modules/plugin/samples/default/windows/plugin.cpp:152 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2681)modules/plugin/samples/default/windows/plugin.cpp:159 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2682)modules/plugin/samples/default/windows/plugin.cpp:163 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2683)modules/plugin/samples/default/windows/plugin.cpp:332 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2684)modules/plugin/samples/default/windows/plugin.cpp:351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2685)modules/plugin/samples/default/windows/plugin.cpp:356 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2686)modules/plugin/samples/default/windows/plugin.cpp:374 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2687)modules/plugin/samples/default/windows/plugin.cpp:379 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2688)modules/plugin/samples/default/windows/plugin.cpp:400 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2689)modules/plugin/samples/default/windows/plugin.cpp:405 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2690)modules/plugin/samples/default/windows/plugin.cpp:409 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2691)modules/plugin/samples/default/windows/plugin.cpp:508 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2692)modules/plugin/samples/default/windows/plugin.cpp:512 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2693)modules/plugin/samples/default/windows/plugin.cpp:544 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2694)modules/plugin/samples/default/windows/plugin.cpp:588 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2695)modules/plugin/samples/default/windows/utils.cpp:140 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2696)modules/plugin/samples/default/windows/utils.cpp:147 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2697)modules/plugin/samples/default/windows/utils.cpp:154 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2698)modules/plugin/samples/default/windows/utils.cpp:165 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2699)modules/plugin/samples/default/windows/utils.cpp:335 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2700)modules/plugin/samples/default/windows/utils.cpp:354 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2701)modules/plugin/samples/default/windows/utils.cpp:377 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2702)modules/plugin/samples/default/windows/utils.cpp:514 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2703)modules/plugin/samples/default/windows/utils.cpp:59 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2704)modules/plugin/samples/default/windows/utils.cpp:125 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2706)modules/plugin/samples/npthread/windows/action.cpp:160 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2707)modules/plugin/samples/npthread/windows/dbg.cpp:42 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2708)modules/plugin/samples/npthread/windows/plugload.cpp:42 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2709)modules/plugin/samples/npthread/windows/plugload.cpp:73 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2710)modules/plugin/samples/npthread/windows/plugload.cpp:74 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2711)modules/plugin/samples/npthread/windows/plugload.cpp:98 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2715)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:132 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r2716)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:1491 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2717)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:1519 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2718)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:1533 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2719)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:1545 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2720)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:2126 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2721)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:2127 High: PL_strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2722)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:1587 High: PL_strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r2723)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:1889 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2724)modules/plugin/samples/SanePlugin/nsSanePlugin.cpp:2149 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2725)modules/plugin/samples/SanePlugin/nsSanePlugin.h:2610 High: system: Argument 1 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r2726)modules/plugin/samples/simple/npsimple.cpp:125 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2727)modules/plugin/samples/testevents/npevents.cpp:815 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2728)modules/plugin/samples/testevents/npevents.cpp:821 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2729)modules/plugin/samples/testevents/npevents.cpp:837 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2730)modules/plugin/samples/testevents/npevents.cpp:851 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2731)modules/plugin/samples/testevents/npevents.cpp:856 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2732)modules/plugin/samples/testevents/npevents.cpp:872 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r2733)modules/plugin/samples/testevents/npevents.cpp:884 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.