r7000)xpinstall/wizard/os2/uninstall/ifuncns.c:161 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7001)xpinstall/wizard/os2/uninstall/ifuncns.c:162 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7002)xpinstall/wizard/os2/uninstall/ifuncns.c:230 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7003)xpinstall/wizard/os2/uninstall/ifuncns.c:261 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7004)xpinstall/wizard/os2/uninstall/ifuncns.c:262 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7005)xpinstall/wizard/os2/uninstall/ifuncns.c:313 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7006)xpinstall/wizard/os2/uninstall/ifuncns.c:105 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7007)xpinstall/wizard/os2/uninstall/ifuncns.c:129 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7008)xpinstall/wizard/os2/uninstall/ifuncns.c:134 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7009)xpinstall/wizard/os2/uninstall/ifuncns.c:169 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7010)xpinstall/wizard/os2/uninstall/ifuncns.c:198 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7011)xpinstall/wizard/os2/uninstall/ifuncns.c:203 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7012)xpinstall/wizard/os2/uninstall/ifuncns.c:288 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7013)xpinstall/wizard/os2/uninstall/ifuncns.c:321 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7014)xpinstall/wizard/os2/uninstall/ifuncns.c:337 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7015)xpinstall/wizard/os2/uninstall/parser.c:108 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7016)xpinstall/wizard/os2/uninstall/parser.c:131 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7017)xpinstall/wizard/os2/uninstall/parser.c:136 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7018)xpinstall/wizard/os2/uninstall/parser.c:171 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7019)xpinstall/wizard/os2/uninstall/parser.c:200 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7020)xpinstall/wizard/os2/uninstall/parser.c:205 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7021)xpinstall/wizard/os2/uninstall/parser.c:290 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7022)xpinstall/wizard/os2/uninstall/parser.c:339 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7023)xpinstall/wizard/os2/uninstall/parser.c:37 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7024)xpinstall/wizard/os2/uninstall/parser.c:38 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7025)xpinstall/wizard/os2/uninstall/parser.c:78 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7026)xpinstall/wizard/os2/uninstall/parser.c:79 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7027)xpinstall/wizard/os2/uninstall/parser.c:80 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7028)xpinstall/wizard/os2/uninstall/parser.c:101 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7029)xpinstall/wizard/os2/uninstall/parser.c:167 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7030)xpinstall/wizard/os2/uninstall/parser.c:184 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7031)xpinstall/wizard/os2/uninstall/parser.c:204 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7032)xpinstall/wizard/os2/uninstall/parser.c:270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7033)xpinstall/wizard/os2/uninstall/parser.c:271 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7036)xpinstall/wizard/os2/uninstall/parser.c:340 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7037)xpinstall/wizard/os2/uninstall/parser.c:341 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7038)xpinstall/wizard/os2/uninstall/parser.c:342 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7039)xpinstall/wizard/os2/uninstall/parser.c:343 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7040)xpinstall/wizard/os2/uninstall/parser.c:344 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7041)xpinstall/wizard/os2/uninstall/parser.c:51 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7042)xpinstall/wizard/os2/uninstall/parser.c:90 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7043)xpinstall/wizard/os2/uninstall/parser.c:119 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7044)xpinstall/wizard/os2/uninstall/parser.c:175 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7045)xpinstall/wizard/os2/uninstall/parser.c:194 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7046)xpinstall/wizard/os2/uninstall/parser.c:210 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7047)xpinstall/wizard/os2/uninstall/parser.c:248 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7048)xpinstall/wizard/os2/uninstall/parser.c:258 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7049)xpinstall/wizard/os2/uninstall/parser.c:281 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7050)xpinstall/wizard/os2/uninstall/parser.c:366 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7051)xpinstall/wizard/os2/uninstall/parser.c:367 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7052)xpinstall/wizard/os2/uninstall/parser.c:368 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7053)xpinstall/wizard/os2/uninstall/parser.c:373 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7054)xpinstall/wizard/os2/uninstall/parser.c:374 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7055)xpinstall/wizard/os2/uninstall/parser.c:379 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7056)xpinstall/wizard/os2/uninstall/parser.c:401 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7057)xpinstall/wizard/os2/uninstall/parser.c:417 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7058)xpinstall/wizard/os2/uninstall/rdi.c:92 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7059)xpinstall/wizard/os2/uninstall/rdi.c:381 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7060)xpinstall/wizard/os2/uninstall/rdi.c:419 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7061)xpinstall/wizard/os2/uninstall/rdi.c:421 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7062)xpinstall/wizard/os2/uninstall/rdi.c:426 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7063)xpinstall/wizard/os2/uninstall/uninstall.c:42 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7064)xpinstall/wizard/os2/uninstall/uninstall.c:43 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7065)xpinstall/wizard/os2/uninstall/uninstall.c:44 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7066)xpinstall/wizard/os2/uninstall/uninstall.c:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7067)xpinstall/wizard/os2/uninstall/uninstall.c:66 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7068)xpinstall/wizard/os2/uninstall/uninstall.c:80 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7069)xpinstall/wizard/os2/uninstall/uninstall.c:84 High: sprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r7070)xpinstall/wizard/unix/src2/nsComponent.cpp:84 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7071)xpinstall/wizard/unix/src2/nsComponentsDlg.cpp:174 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7072)xpinstall/wizard/unix/src2/nsComponentsDlg.cpp:111 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7073)xpinstall/wizard/unix/src2/nsComponentsDlg.cpp:112 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7078)xpinstall/wizard/unix/src2/nsINIParser.cpp:150 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7079)xpinstall/wizard/unix/src2/nsINIParser.cpp:202 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7080)xpinstall/wizard/unix/src2/nsINIParser.cpp:226 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7081)xpinstall/wizard/unix/src2/nsINIParser.cpp:236 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7082)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:117 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7083)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:202 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7084)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:307 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7085)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:308 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7086)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:624 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7087)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:681 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7088)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:742 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7089)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:744 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7090)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:745 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7091)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:780 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7092)xpinstall/wizard/unix/src2/nsInstallDlg.cpp:925 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7099)xpinstall/wizard/unix/src2/nsLicenseDlg.cpp:238 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7100)xpinstall/wizard/unix/src2/nsLicenseDlg.cpp:641 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7101)xpinstall/wizard/unix/src2/nsLicenseDlg.cpp:695 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7102)xpinstall/wizard/unix/src2/nsLicenseDlg.cpp:699 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7103)xpinstall/wizard/unix/src2/nsLicenseDlg.cpp:703 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7104)xpinstall/wizard/unix/src2/nsLicenseDlg.cpp:817 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7105)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:262 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 257 (fopen)
r7122)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:708 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7123)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:789 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7124)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:855 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7125)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:861 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7126)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:927 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7127)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:991 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7128)xpinstall/wizard/unix/src2/nsSetupTypeDlg.cpp:992 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7130)xpinstall/wizard/unix/src2/nsWelcomeDlg.cpp:805 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 807 (mkdir)
r7131)xpinstall/wizard/unix/src2/nsXIContext.cpp:247 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 242 (fopen)
r7132)xpinstall/wizard/unix/src2/nsXIContext.cpp:130 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7133)xpinstall/wizard/unix/src2/nsXIEngine.cpp:95 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r7134)xpinstall/wizard/unix/src2/nsXIEngine.cpp:104 Medium: realloc: Don't use on memory intended to be secure, because the old structure will not be zeroed out.
r7141)xpinstall/wizard/unix/src2/nsXIEngine.cpp:94 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7142)xpinstall/wizard/unix/src2/nsXIEngine.cpp:479 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7143)xpinstall/wizard/unix/src2/nsXIEngine.cpp:537 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7144)xpinstall/wizard/unix/src2/nsXIEngine.cpp:609 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7145)xpinstall/wizard/unix/src2/nsXIEngine.cpp:610 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7146)xpinstall/wizard/unix/src2/nsXIEngine.cpp:682 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7147)xpinstall/wizard/unix/src2/nsXIEngine.cpp:762 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7148)xpinstall/wizard/unix/src2/nsXIEngine.cpp:791 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7149)xpinstall/wizard/unix/src2/nsXIEngine.cpp:1015 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7150)xpinstall/wizard/unix/src2/nsXIEngine.cpp:1064 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7154)xpinstall/wizard/unix/src2/nsXIEngine.cpp:125 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 127 (mkdir)
r7155)xpinstall/wizard/unix/src2/nsXInstaller.cpp:901 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 854 (fopen), 896 (fopen), 964 (unlink)
r7157)xpinstall/wizard/unix/src2/nsXInstaller.cpp:389 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7158)xpinstall/wizard/unix/src2/nsXInstaller.cpp:390 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7159)xpinstall/wizard/unix/src2/nsXInstaller.cpp:391 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7164)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:400 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7165)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:401 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7166)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:405 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7167)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:408 High: sprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7168)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:52 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7169)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:53 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7170)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:54 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7171)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:55 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7172)xpinstall/wizard/unix/src2/nsZipExtractor.cpp:149 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7173)xpinstall/wizard/unix/src2/nsComponent.h:164 Medium: stat: A potential TOCTOU (Time Of Check, Time Of Use) vulnerability exists. This is the first line where a check has occured. The following line(s) contain uses that may match up with this check: 165 (mkdir)
r7174)xpinstall/wizard/windows/ds32/ds32.cpp:108 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7175)xpinstall/wizard/windows/ds32/ds32.cpp:109 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7176)xpinstall/wizard/windows/ds32/ds32.cpp:126 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7177)xpinstall/wizard/windows/ds32/ds32.cpp:132 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7178)xpinstall/wizard/windows/ds32/ds32.cpp:141 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7179)xpinstall/wizard/windows/ds32/ds32.cpp:148 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7180)xpinstall/wizard/windows/ds32/ds32.cpp:202 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7181)xpinstall/wizard/windows/ds32/ds32.cpp:203 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7182)xpinstall/wizard/windows/ds32/ds32.cpp:504 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7183)xpinstall/wizard/windows/ds32/ds32.cpp:505 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7184)xpinstall/wizard/windows/GetShortPathName/GetShortPathName.c:226 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7229)xpinstall/wizard/windows/nsztool/nsztool.c:914 High: CreateProcess: Argument 3 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r7230)xpinstall/wizard/windows/nsztool/nsztool.c:39 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7231)xpinstall/wizard/windows/nsztool/nsztool.c:52 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7232)xpinstall/wizard/windows/nsztool/nsztool.c:372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7233)xpinstall/wizard/windows/nsztool/nsztool.c:373 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7234)xpinstall/wizard/windows/nsztool/nsztool.c:440 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7235)xpinstall/wizard/windows/nsztool/nsztool.c:542 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7236)xpinstall/wizard/windows/nsztool/nsztool.c:543 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7237)xpinstall/wizard/windows/nsztool/nsztool.c:544 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7238)xpinstall/wizard/windows/nsztool/nsztool.c:545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7239)xpinstall/wizard/windows/nsztool/nsztool.c:546 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7240)xpinstall/wizard/windows/nsztool/nsztool.c:547 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7241)xpinstall/wizard/windows/nsztool/nsztool.c:548 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7242)xpinstall/wizard/windows/nsztool/nsztool.c:551 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7243)xpinstall/wizard/windows/nsztool/nsztool.c:678 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7244)xpinstall/wizard/windows/nsztool/nsztool.c:78 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7245)xpinstall/wizard/windows/nsztool/nsztool.c:145 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7246)xpinstall/wizard/windows/nsztool/nsztool.c:151 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7247)xpinstall/wizard/windows/nsztool/nsztool.c:160 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7248)xpinstall/wizard/windows/nsztool/nsztool.c:167 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7249)xpinstall/wizard/windows/nsztool/nsztool.c:583 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7250)xpinstall/wizard/windows/nsztool/nsztool.c:585 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7251)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:684 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7252)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:177 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7253)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:198 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7254)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:178 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7255)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:179 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7256)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:199 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7257)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:200 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7258)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:356 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7259)xpinstall/wizard/windows/palmsync/PalmSyncInstall.cpp:357 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7260)xpinstall/wizard/windows/ren8dot3/ren8dot3.c:181 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7261)xpinstall/wizard/windows/ren8dot3/ren8dot3.c:201 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7262)xpinstall/wizard/windows/ren8dot3/ren8dot3.c:308 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7263)xpinstall/wizard/windows/ren8dot3/ren8dot3.c:323 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7264)xpinstall/wizard/windows/ren8dot3/ren8dot3.c:39 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7265)xpinstall/wizard/windows/ren8dot3/ren8dot3.c:72 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7266)xpinstall/wizard/windows/setup/shortcut.cpp:54 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7267)xpinstall/wizard/windows/setup/shortcut.cpp:43 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7268)xpinstall/wizard/windows/setup/shortcut.cpp:45 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7269)xpinstall/wizard/windows/setup/xpnetHook.cpp:47 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7270)xpinstall/wizard/windows/setup/xpnetHook.cpp:97 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7271)xpinstall/wizard/windows/setup/xpnetHook.cpp:98 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7272)xpinstall/wizard/windows/setup/xpnetHook.cpp:218 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7273)xpinstall/wizard/windows/setup/xpnetHook.cpp:219 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7274)xpinstall/wizard/windows/setup/xpnetHook.cpp:220 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7275)xpinstall/wizard/windows/setup/xpnetHook.cpp:221 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7276)xpinstall/wizard/windows/setup/xpnetHook.cpp:229 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7277)xpinstall/wizard/windows/setup/xpnetHook.cpp:341 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7278)xpinstall/wizard/windows/setup/xpnetHook.cpp:354 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7279)xpinstall/wizard/windows/setup/xpnetHook.cpp:355 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7280)xpinstall/wizard/windows/setup/xpnetHook.cpp:386 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7281)xpinstall/wizard/windows/setup/xpnetHook.cpp:387 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7282)xpinstall/wizard/windows/setup/xpnetHook.cpp:421 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7283)xpinstall/wizard/windows/setup/xpnetHook.cpp:422 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7284)xpinstall/wizard/windows/setup/xpnetHook.cpp:423 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7285)xpinstall/wizard/windows/setup/xpnetHook.cpp:488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7286)xpinstall/wizard/windows/setup/xpnetHook.cpp:533 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7287)xpinstall/wizard/windows/setup/xpnetHook.cpp:545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7288)xpinstall/wizard/windows/setup/xpnetHook.cpp:600 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7289)xpinstall/wizard/windows/setup/xpnetHook.cpp:628 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7290)xpinstall/wizard/windows/setup/xpnetHook.cpp:671 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7291)xpinstall/wizard/windows/setup/xpnetHook.cpp:703 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7292)xpinstall/wizard/windows/setup/xpnetHook.cpp:752 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7293)xpinstall/wizard/windows/setup/xpnetHook.cpp:842 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7294)xpinstall/wizard/windows/setup/xpnetHook.cpp:843 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7295)xpinstall/wizard/windows/setup/xpnetHook.cpp:844 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7296)xpinstall/wizard/windows/setup/xpnetHook.cpp:845 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7297)xpinstall/wizard/windows/setup/xpnetHook.cpp:846 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7298)xpinstall/wizard/windows/setup/xpnetHook.cpp:853 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7299)xpinstall/wizard/windows/setup/xpnetHook.cpp:855 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7300)xpinstall/wizard/windows/setup/xpnetHook.cpp:856 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7301)xpinstall/wizard/windows/setup/xpnetHook.cpp:1029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7302)xpinstall/wizard/windows/setup/xpnetHook.cpp:1030 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7303)xpinstall/wizard/windows/setup/xpnetHook.cpp:1152 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7312)xpinstall/wizard/windows/setup/xpnetHook.cpp:332 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7313)xpinstall/wizard/windows/setup/xpnetHook.cpp:344 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7314)xpinstall/wizard/windows/setup/xpnetHook.cpp:392 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7315)xpinstall/wizard/windows/setup/xpnetHook.cpp:1165 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7316)xpinstall/wizard/windows/setup/xpnetHook.cpp:363 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7317)xpinstall/wizard/windows/setup/xpnetHook.cpp:369 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7318)xpinstall/wizard/windows/setup/xpnetHook.cpp:961 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7319)xpinstall/wizard/windows/setup/xpnetHook.cpp:1140 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7320)xpinstall/wizard/windows/setup/xpnetHook.cpp:1155 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7321)xpinstall/wizard/windows/setup/dialogs.c:963 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7322)xpinstall/wizard/windows/setup/dialogs.c:46 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7323)xpinstall/wizard/windows/setup/dialogs.c:47 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7324)xpinstall/wizard/windows/setup/dialogs.c:48 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7325)xpinstall/wizard/windows/setup/dialogs.c:88 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7326)xpinstall/wizard/windows/setup/dialogs.c:142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7327)xpinstall/wizard/windows/setup/dialogs.c:242 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7328)xpinstall/wizard/windows/setup/dialogs.c:243 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7329)xpinstall/wizard/windows/setup/dialogs.c:244 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7330)xpinstall/wizard/windows/setup/dialogs.c:319 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7331)xpinstall/wizard/windows/setup/dialogs.c:329 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7332)xpinstall/wizard/windows/setup/dialogs.c:330 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7333)xpinstall/wizard/windows/setup/dialogs.c:331 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7334)xpinstall/wizard/windows/setup/dialogs.c:332 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7335)xpinstall/wizard/windows/setup/dialogs.c:346 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7336)xpinstall/wizard/windows/setup/dialogs.c:350 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7337)xpinstall/wizard/windows/setup/dialogs.c:396 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7338)xpinstall/wizard/windows/setup/dialogs.c:397 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7339)xpinstall/wizard/windows/setup/dialogs.c:398 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7340)xpinstall/wizard/windows/setup/dialogs.c:399 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7341)xpinstall/wizard/windows/setup/dialogs.c:400 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7342)xpinstall/wizard/windows/setup/dialogs.c:401 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7343)xpinstall/wizard/windows/setup/dialogs.c:522 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7344)xpinstall/wizard/windows/setup/dialogs.c:523 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7345)xpinstall/wizard/windows/setup/dialogs.c:524 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7346)xpinstall/wizard/windows/setup/dialogs.c:705 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7347)xpinstall/wizard/windows/setup/dialogs.c:706 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7348)xpinstall/wizard/windows/setup/dialogs.c:720 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7349)xpinstall/wizard/windows/setup/dialogs.c:724 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7350)xpinstall/wizard/windows/setup/dialogs.c:1079 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7351)xpinstall/wizard/windows/setup/dialogs.c:1225 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7352)xpinstall/wizard/windows/setup/dialogs.c:1503 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7353)xpinstall/wizard/windows/setup/dialogs.c:1565 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7354)xpinstall/wizard/windows/setup/dialogs.c:1613 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7355)xpinstall/wizard/windows/setup/dialogs.c:1743 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7356)xpinstall/wizard/windows/setup/dialogs.c:1747 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7357)xpinstall/wizard/windows/setup/dialogs.c:1903 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7358)xpinstall/wizard/windows/setup/dialogs.c:1904 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7359)xpinstall/wizard/windows/setup/dialogs.c:2152 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7360)xpinstall/wizard/windows/setup/dialogs.c:2408 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7361)xpinstall/wizard/windows/setup/dialogs.c:2409 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7362)xpinstall/wizard/windows/setup/dialogs.c:2496 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7363)xpinstall/wizard/windows/setup/dialogs.c:2518 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7364)xpinstall/wizard/windows/setup/dialogs.c:2524 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7365)xpinstall/wizard/windows/setup/dialogs.c:2544 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7366)xpinstall/wizard/windows/setup/dialogs.c:2545 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7367)xpinstall/wizard/windows/setup/dialogs.c:2809 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7368)xpinstall/wizard/windows/setup/dialogs.c:2810 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7378)xpinstall/wizard/windows/setup/dialogs.c:97 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7379)xpinstall/wizard/windows/setup/dialogs.c:341 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7380)xpinstall/wizard/windows/setup/dialogs.c:358 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7381)xpinstall/wizard/windows/setup/dialogs.c:715 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7382)xpinstall/wizard/windows/setup/dialogs.c:732 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7383)xpinstall/wizard/windows/setup/dialogs.c:2420 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7384)xpinstall/wizard/windows/setup/dialogs.c:2422 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7385)xpinstall/wizard/windows/setup/dialogs.c:2528 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7386)xpinstall/wizard/windows/setup/dialogs.c:2558 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7387)xpinstall/wizard/windows/setup/dialogs.c:159 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7388)xpinstall/wizard/windows/setup/dialogs.c:369 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7389)xpinstall/wizard/windows/setup/dialogs.c:383 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7390)xpinstall/wizard/windows/setup/dialogs.c:410 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7391)xpinstall/wizard/windows/setup/dialogs.c:418 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7392)xpinstall/wizard/windows/setup/dialogs.c:474 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7393)xpinstall/wizard/windows/setup/dialogs.c:696 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7394)xpinstall/wizard/windows/setup/dialogs.c:700 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7395)xpinstall/wizard/windows/setup/dialogs.c:743 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7396)xpinstall/wizard/windows/setup/dialogs.c:793 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7397)xpinstall/wizard/windows/setup/dialogs.c:799 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7398)xpinstall/wizard/windows/setup/dialogs.c:931 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7399)xpinstall/wizard/windows/setup/dialogs.c:1176 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7400)xpinstall/wizard/windows/setup/dialogs.c:1322 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7401)xpinstall/wizard/windows/setup/dialogs.c:1517 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7402)xpinstall/wizard/windows/setup/dialogs.c:1571 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7403)xpinstall/wizard/windows/setup/dialogs.c:2425 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7404)xpinstall/wizard/windows/setup/dialogs.c:2820 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7405)xpinstall/wizard/windows/setup/dialogs.c:2840 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7406)xpinstall/wizard/windows/setup/dialogs.c:2850 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7407)xpinstall/wizard/windows/setup/extra.c:161 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7408)xpinstall/wizard/windows/setup/extra.c:295 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7409)xpinstall/wizard/windows/setup/extra.c:300 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7410)xpinstall/wizard/windows/setup/extra.c:308 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7411)xpinstall/wizard/windows/setup/extra.c:338 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7412)xpinstall/wizard/windows/setup/extra.c:353 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7413)xpinstall/wizard/windows/setup/extra.c:371 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7414)xpinstall/wizard/windows/setup/extra.c:712 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7415)xpinstall/wizard/windows/setup/extra.c:727 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7416)xpinstall/wizard/windows/setup/extra.c:745 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7417)xpinstall/wizard/windows/setup/extra.c:936 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7418)xpinstall/wizard/windows/setup/extra.c:938 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7419)xpinstall/wizard/windows/setup/extra.c:1125 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7420)xpinstall/wizard/windows/setup/extra.c:1271 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7421)xpinstall/wizard/windows/setup/extra.c:2027 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7422)xpinstall/wizard/windows/setup/extra.c:2055 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7423)xpinstall/wizard/windows/setup/extra.c:2066 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7424)xpinstall/wizard/windows/setup/extra.c:2075 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7425)xpinstall/wizard/windows/setup/extra.c:2090 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7426)xpinstall/wizard/windows/setup/extra.c:2094 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7428)xpinstall/wizard/windows/setup/extra.c:2104 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7429)xpinstall/wizard/windows/setup/extra.c:2114 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7430)xpinstall/wizard/windows/setup/extra.c:2119 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7431)xpinstall/wizard/windows/setup/extra.c:2129 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7432)xpinstall/wizard/windows/setup/extra.c:2135 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7433)xpinstall/wizard/windows/setup/extra.c:2824 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7434)xpinstall/wizard/windows/setup/extra.c:2842 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7435)xpinstall/wizard/windows/setup/extra.c:2852 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7436)xpinstall/wizard/windows/setup/extra.c:143 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7437)xpinstall/wizard/windows/setup/extra.c:213 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7438)xpinstall/wizard/windows/setup/extra.c:233 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7439)xpinstall/wizard/windows/setup/extra.c:255 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7440)xpinstall/wizard/windows/setup/extra.c:305 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7441)xpinstall/wizard/windows/setup/extra.c:317 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7442)xpinstall/wizard/windows/setup/extra.c:331 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7443)xpinstall/wizard/windows/setup/extra.c:332 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7444)xpinstall/wizard/windows/setup/extra.c:358 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7445)xpinstall/wizard/windows/setup/extra.c:372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7446)xpinstall/wizard/windows/setup/extra.c:394 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7447)xpinstall/wizard/windows/setup/extra.c:429 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7448)xpinstall/wizard/windows/setup/extra.c:430 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7449)xpinstall/wizard/windows/setup/extra.c:431 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7450)xpinstall/wizard/windows/setup/extra.c:432 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7451)xpinstall/wizard/windows/setup/extra.c:484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7452)xpinstall/wizard/windows/setup/extra.c:485 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7453)xpinstall/wizard/windows/setup/extra.c:486 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7454)xpinstall/wizard/windows/setup/extra.c:487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7455)xpinstall/wizard/windows/setup/extra.c:488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7456)xpinstall/wizard/windows/setup/extra.c:489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7457)xpinstall/wizard/windows/setup/extra.c:490 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7458)xpinstall/wizard/windows/setup/extra.c:491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7459)xpinstall/wizard/windows/setup/extra.c:586 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7460)xpinstall/wizard/windows/setup/extra.c:587 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7461)xpinstall/wizard/windows/setup/extra.c:611 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7462)xpinstall/wizard/windows/setup/extra.c:659 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7463)xpinstall/wizard/windows/setup/extra.c:707 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7464)xpinstall/wizard/windows/setup/extra.c:925 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7465)xpinstall/wizard/windows/setup/extra.c:926 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7466)xpinstall/wizard/windows/setup/extra.c:961 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7467)xpinstall/wizard/windows/setup/extra.c:962 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7468)xpinstall/wizard/windows/setup/extra.c:963 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7469)xpinstall/wizard/windows/setup/extra.c:977 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7470)xpinstall/wizard/windows/setup/extra.c:992 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7471)xpinstall/wizard/windows/setup/extra.c:993 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7472)xpinstall/wizard/windows/setup/extra.c:994 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7473)xpinstall/wizard/windows/setup/extra.c:995 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7474)xpinstall/wizard/windows/setup/extra.c:1022 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7475)xpinstall/wizard/windows/setup/extra.c:1040 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7476)xpinstall/wizard/windows/setup/extra.c:1041 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7477)xpinstall/wizard/windows/setup/extra.c:1042 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7478)xpinstall/wizard/windows/setup/extra.c:1043 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7479)xpinstall/wizard/windows/setup/extra.c:1070 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7480)xpinstall/wizard/windows/setup/extra.c:1089 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7481)xpinstall/wizard/windows/setup/extra.c:1090 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7482)xpinstall/wizard/windows/setup/extra.c:1091 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7483)xpinstall/wizard/windows/setup/extra.c:1092 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7484)xpinstall/wizard/windows/setup/extra.c:1211 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7485)xpinstall/wizard/windows/setup/extra.c:1252 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7486)xpinstall/wizard/windows/setup/extra.c:1253 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7487)xpinstall/wizard/windows/setup/extra.c:1254 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7488)xpinstall/wizard/windows/setup/extra.c:1264 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7489)xpinstall/wizard/windows/setup/extra.c:1285 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7490)xpinstall/wizard/windows/setup/extra.c:1286 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7491)xpinstall/wizard/windows/setup/extra.c:1287 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7492)xpinstall/wizard/windows/setup/extra.c:1288 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7493)xpinstall/wizard/windows/setup/extra.c:1289 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7494)xpinstall/wizard/windows/setup/extra.c:1290 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7495)xpinstall/wizard/windows/setup/extra.c:1410 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7496)xpinstall/wizard/windows/setup/extra.c:1431 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7497)xpinstall/wizard/windows/setup/extra.c:1432 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7498)xpinstall/wizard/windows/setup/extra.c:1433 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7499)xpinstall/wizard/windows/setup/extra.c:1434 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7500)xpinstall/wizard/windows/setup/extra.c:1435 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7501)xpinstall/wizard/windows/setup/extra.c:1436 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7502)xpinstall/wizard/windows/setup/extra.c:1477 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7503)xpinstall/wizard/windows/setup/extra.c:1508 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7504)xpinstall/wizard/windows/setup/extra.c:1509 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7505)xpinstall/wizard/windows/setup/extra.c:1510 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7506)xpinstall/wizard/windows/setup/extra.c:1511 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7507)xpinstall/wizard/windows/setup/extra.c:1537 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7508)xpinstall/wizard/windows/setup/extra.c:1538 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7509)xpinstall/wizard/windows/setup/extra.c:1608 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7510)xpinstall/wizard/windows/setup/extra.c:1609 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7511)xpinstall/wizard/windows/setup/extra.c:1610 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7512)xpinstall/wizard/windows/setup/extra.c:1611 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7513)xpinstall/wizard/windows/setup/extra.c:1612 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7514)xpinstall/wizard/windows/setup/extra.c:1613 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7515)xpinstall/wizard/windows/setup/extra.c:1728 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7516)xpinstall/wizard/windows/setup/extra.c:1992 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7517)xpinstall/wizard/windows/setup/extra.c:1993 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7518)xpinstall/wizard/windows/setup/extra.c:2029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7519)xpinstall/wizard/windows/setup/extra.c:2030 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7520)xpinstall/wizard/windows/setup/extra.c:2031 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7521)xpinstall/wizard/windows/setup/extra.c:2100 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7522)xpinstall/wizard/windows/setup/extra.c:2101 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7523)xpinstall/wizard/windows/setup/extra.c:2102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7524)xpinstall/wizard/windows/setup/extra.c:2113 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7525)xpinstall/wizard/windows/setup/extra.c:2578 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7526)xpinstall/wizard/windows/setup/extra.c:3044 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7527)xpinstall/wizard/windows/setup/extra.c:3045 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7528)xpinstall/wizard/windows/setup/extra.c:3059 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7529)xpinstall/wizard/windows/setup/extra.c:3060 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7530)xpinstall/wizard/windows/setup/extra.c:3081 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7531)xpinstall/wizard/windows/setup/extra.c:3082 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7532)xpinstall/wizard/windows/setup/extra.c:3083 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7533)xpinstall/wizard/windows/setup/extra.c:3084 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7534)xpinstall/wizard/windows/setup/extra.c:3085 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7535)xpinstall/wizard/windows/setup/extra.c:3086 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7536)xpinstall/wizard/windows/setup/extra.c:3667 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7537)xpinstall/wizard/windows/setup/extra.c:3684 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7538)xpinstall/wizard/windows/setup/extra.c:3685 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7539)xpinstall/wizard/windows/setup/extra.c:3686 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7540)xpinstall/wizard/windows/setup/extra.c:3687 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7541)xpinstall/wizard/windows/setup/extra.c:3725 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7542)xpinstall/wizard/windows/setup/extra.c:3748 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7543)xpinstall/wizard/windows/setup/extra.c:3749 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7544)xpinstall/wizard/windows/setup/extra.c:3750 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7545)xpinstall/wizard/windows/setup/extra.c:3751 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7546)xpinstall/wizard/windows/setup/extra.c:3752 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7547)xpinstall/wizard/windows/setup/extra.c:3753 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7548)xpinstall/wizard/windows/setup/extra.c:3754 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7549)xpinstall/wizard/windows/setup/extra.c:3755 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7550)xpinstall/wizard/windows/setup/extra.c:3756 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7551)xpinstall/wizard/windows/setup/extra.c:3757 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7552)xpinstall/wizard/windows/setup/extra.c:3846 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7553)xpinstall/wizard/windows/setup/extra.c:3847 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7554)xpinstall/wizard/windows/setup/extra.c:3848 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7555)xpinstall/wizard/windows/setup/extra.c:3932 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7556)xpinstall/wizard/windows/setup/extra.c:3933 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7557)xpinstall/wizard/windows/setup/extra.c:3934 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7558)xpinstall/wizard/windows/setup/extra.c:3935 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7559)xpinstall/wizard/windows/setup/extra.c:3936 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7560)xpinstall/wizard/windows/setup/extra.c:4031 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7561)xpinstall/wizard/windows/setup/extra.c:4062 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7562)xpinstall/wizard/windows/setup/extra.c:4142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7563)xpinstall/wizard/windows/setup/extra.c:4143 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7564)xpinstall/wizard/windows/setup/extra.c:4144 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7565)xpinstall/wizard/windows/setup/extra.c:4145 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7566)xpinstall/wizard/windows/setup/extra.c:4146 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7567)xpinstall/wizard/windows/setup/extra.c:4216 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7568)xpinstall/wizard/windows/setup/extra.c:4217 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7569)xpinstall/wizard/windows/setup/extra.c:4218 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7570)xpinstall/wizard/windows/setup/extra.c:4264 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7571)xpinstall/wizard/windows/setup/extra.c:4265 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7572)xpinstall/wizard/windows/setup/extra.c:4266 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7573)xpinstall/wizard/windows/setup/extra.c:4267 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7574)xpinstall/wizard/windows/setup/extra.c:4268 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7575)xpinstall/wizard/windows/setup/extra.c:4269 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7576)xpinstall/wizard/windows/setup/extra.c:4270 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7577)xpinstall/wizard/windows/setup/extra.c:4271 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7578)xpinstall/wizard/windows/setup/extra.c:4272 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7579)xpinstall/wizard/windows/setup/extra.c:4438 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7580)xpinstall/wizard/windows/setup/extra.c:4439 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7581)xpinstall/wizard/windows/setup/extra.c:4440 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7582)xpinstall/wizard/windows/setup/extra.c:4459 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7583)xpinstall/wizard/windows/setup/extra.c:4460 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7584)xpinstall/wizard/windows/setup/extra.c:4461 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7585)xpinstall/wizard/windows/setup/extra.c:4462 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7586)xpinstall/wizard/windows/setup/extra.c:4463 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7587)xpinstall/wizard/windows/setup/extra.c:4464 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7588)xpinstall/wizard/windows/setup/extra.c:4524 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7589)xpinstall/wizard/windows/setup/extra.c:4525 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7590)xpinstall/wizard/windows/setup/extra.c:4526 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7591)xpinstall/wizard/windows/setup/extra.c:4527 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7592)xpinstall/wizard/windows/setup/extra.c:4528 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7593)xpinstall/wizard/windows/setup/extra.c:4529 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7594)xpinstall/wizard/windows/setup/extra.c:4530 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7595)xpinstall/wizard/windows/setup/extra.c:4581 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7596)xpinstall/wizard/windows/setup/extra.c:4639 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7597)xpinstall/wizard/windows/setup/extra.c:4680 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7598)xpinstall/wizard/windows/setup/extra.c:4715 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7599)xpinstall/wizard/windows/setup/extra.c:5028 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7600)xpinstall/wizard/windows/setup/extra.c:5029 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7601)xpinstall/wizard/windows/setup/extra.c:5030 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7602)xpinstall/wizard/windows/setup/extra.c:5060 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7603)xpinstall/wizard/windows/setup/extra.c:5065 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7604)xpinstall/wizard/windows/setup/extra.c:5066 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7605)xpinstall/wizard/windows/setup/extra.c:5160 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7606)xpinstall/wizard/windows/setup/extra.c:5204 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7607)xpinstall/wizard/windows/setup/extra.c:5245 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7608)xpinstall/wizard/windows/setup/extra.c:5246 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7609)xpinstall/wizard/windows/setup/extra.c:5247 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7610)xpinstall/wizard/windows/setup/extra.c:5248 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7611)xpinstall/wizard/windows/setup/extra.c:5249 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7612)xpinstall/wizard/windows/setup/extra.c:5250 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7613)xpinstall/wizard/windows/setup/extra.c:5257 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7614)xpinstall/wizard/windows/setup/extra.c:5376 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7615)xpinstall/wizard/windows/setup/extra.c:5377 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7616)xpinstall/wizard/windows/setup/extra.c:5378 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7617)xpinstall/wizard/windows/setup/extra.c:5379 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7618)xpinstall/wizard/windows/setup/extra.c:5380 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7619)xpinstall/wizard/windows/setup/extra.c:5381 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7620)xpinstall/wizard/windows/setup/extra.c:5382 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7621)xpinstall/wizard/windows/setup/extra.c:5383 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7622)xpinstall/wizard/windows/setup/extra.c:5384 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7623)xpinstall/wizard/windows/setup/extra.c:5643 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7624)xpinstall/wizard/windows/setup/extra.c:5644 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7625)xpinstall/wizard/windows/setup/extra.c:5698 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7626)xpinstall/wizard/windows/setup/extra.c:5699 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7627)xpinstall/wizard/windows/setup/extra.c:5700 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7628)xpinstall/wizard/windows/setup/extra.c:5701 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7629)xpinstall/wizard/windows/setup/extra.c:5770 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7630)xpinstall/wizard/windows/setup/extra.c:5771 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7631)xpinstall/wizard/windows/setup/extra.c:5776 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7632)xpinstall/wizard/windows/setup/extra.c:5777 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7633)xpinstall/wizard/windows/setup/extra.c:5778 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7634)xpinstall/wizard/windows/setup/extra.c:5824 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7635)xpinstall/wizard/windows/setup/extra.c:5825 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7636)xpinstall/wizard/windows/setup/extra.c:5826 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7637)xpinstall/wizard/windows/setup/extra.c:5827 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7638)xpinstall/wizard/windows/setup/extra.c:5908 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7639)xpinstall/wizard/windows/setup/extra.c:6364 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7640)xpinstall/wizard/windows/setup/extra.c:6386 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7641)xpinstall/wizard/windows/setup/extra.c:6487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7642)xpinstall/wizard/windows/setup/extra.c:6488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7643)xpinstall/wizard/windows/setup/extra.c:6489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7644)xpinstall/wizard/windows/setup/extra.c:6525 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7645)xpinstall/wizard/windows/setup/extra.c:6526 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7646)xpinstall/wizard/windows/setup/extra.c:6527 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7647)xpinstall/wizard/windows/setup/extra.c:6558 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7648)xpinstall/wizard/windows/setup/extra.c:6584 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7649)xpinstall/wizard/windows/setup/extra.c:6585 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7650)xpinstall/wizard/windows/setup/extra.c:6586 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7651)xpinstall/wizard/windows/setup/extra.c:6587 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7652)xpinstall/wizard/windows/setup/extra.c:6588 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7653)xpinstall/wizard/windows/setup/extra.c:6673 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7654)xpinstall/wizard/windows/setup/extra.c:6712 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7655)xpinstall/wizard/windows/setup/extra.c:6713 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7656)xpinstall/wizard/windows/setup/extra.c:6714 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7657)xpinstall/wizard/windows/setup/extra.c:6715 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7658)xpinstall/wizard/windows/setup/extra.c:6716 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7659)xpinstall/wizard/windows/setup/extra.c:6717 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7660)xpinstall/wizard/windows/setup/extra.c:6964 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7661)xpinstall/wizard/windows/setup/extra.c:6986 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7662)xpinstall/wizard/windows/setup/extra.c:6998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7663)xpinstall/wizard/windows/setup/extra.c:7084 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7664)xpinstall/wizard/windows/setup/extra.c:7098 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7665)xpinstall/wizard/windows/setup/extra.c:7165 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7666)xpinstall/wizard/windows/setup/extra.c:7166 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7667)xpinstall/wizard/windows/setup/extra.c:7167 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7668)xpinstall/wizard/windows/setup/extra.c:7168 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7669)xpinstall/wizard/windows/setup/extra.c:7169 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7670)xpinstall/wizard/windows/setup/extra.c:7170 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7671)xpinstall/wizard/windows/setup/extra.c:7284 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7672)xpinstall/wizard/windows/setup/extra.c:7346 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7673)xpinstall/wizard/windows/setup/extra.c:7364 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7674)xpinstall/wizard/windows/setup/extra.c:7382 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7675)xpinstall/wizard/windows/setup/extra.c:7400 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7676)xpinstall/wizard/windows/setup/extra.c:7418 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7677)xpinstall/wizard/windows/setup/extra.c:7436 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7678)xpinstall/wizard/windows/setup/extra.c:7454 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7679)xpinstall/wizard/windows/setup/extra.c:7472 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7680)xpinstall/wizard/windows/setup/extra.c:7491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7681)xpinstall/wizard/windows/setup/extra.c:7553 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7682)xpinstall/wizard/windows/setup/extra.c:7564 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7683)xpinstall/wizard/windows/setup/extra.c:7565 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7684)xpinstall/wizard/windows/setup/extra.c:7592 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7685)xpinstall/wizard/windows/setup/extra.c:7634 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7686)xpinstall/wizard/windows/setup/extra.c:7699 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7687)xpinstall/wizard/windows/setup/extra.c:7725 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7688)xpinstall/wizard/windows/setup/extra.c:7726 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7689)xpinstall/wizard/windows/setup/extra.c:7727 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7690)xpinstall/wizard/windows/setup/extra.c:7728 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7691)xpinstall/wizard/windows/setup/extra.c:7729 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7692)xpinstall/wizard/windows/setup/extra.c:7942 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7693)xpinstall/wizard/windows/setup/extra.c:7943 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r7722)xpinstall/wizard/windows/setup/extra.c:223 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7723)xpinstall/wizard/windows/setup/extra.c:240 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7724)xpinstall/wizard/windows/setup/extra.c:262 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7725)xpinstall/wizard/windows/setup/extra.c:307 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7726)xpinstall/wizard/windows/setup/extra.c:319 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7727)xpinstall/wizard/windows/setup/extra.c:339 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7728)xpinstall/wizard/windows/setup/extra.c:360 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7729)xpinstall/wizard/windows/setup/extra.c:374 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7730)xpinstall/wizard/windows/setup/extra.c:404 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7731)xpinstall/wizard/windows/setup/extra.c:618 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7732)xpinstall/wizard/windows/setup/extra.c:711 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7733)xpinstall/wizard/windows/setup/extra.c:981 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7734)xpinstall/wizard/windows/setup/extra.c:1026 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7735)xpinstall/wizard/windows/setup/extra.c:1074 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7736)xpinstall/wizard/windows/setup/extra.c:1273 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7737)xpinstall/wizard/windows/setup/extra.c:1482 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7738)xpinstall/wizard/windows/setup/extra.c:1542 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7739)xpinstall/wizard/windows/setup/extra.c:2034 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7740)xpinstall/wizard/windows/setup/extra.c:3731 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7741)xpinstall/wizard/windows/setup/extra.c:3787 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7742)xpinstall/wizard/windows/setup/extra.c:5053 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7743)xpinstall/wizard/windows/setup/extra.c:5787 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7744)xpinstall/wizard/windows/setup/extra.c:5795 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7745)xpinstall/wizard/windows/setup/extra.c:5917 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7746)xpinstall/wizard/windows/setup/extra.c:6372 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7747)xpinstall/wizard/windows/setup/extra.c:6399 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7748)xpinstall/wizard/windows/setup/extra.c:7597 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7749)xpinstall/wizard/windows/setup/extra.c:7930 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r7750)xpinstall/wizard/windows/setup/extra.c:445 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7751)xpinstall/wizard/windows/setup/extra.c:456 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7752)xpinstall/wizard/windows/setup/extra.c:521 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7753)xpinstall/wizard/windows/setup/extra.c:528 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7754)xpinstall/wizard/windows/setup/extra.c:613 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7755)xpinstall/wizard/windows/setup/extra.c:637 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7756)xpinstall/wizard/windows/setup/extra.c:670 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7757)xpinstall/wizard/windows/setup/extra.c:683 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7758)xpinstall/wizard/windows/setup/extra.c:766 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7759)xpinstall/wizard/windows/setup/extra.c:929 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7760)xpinstall/wizard/windows/setup/extra.c:945 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7761)xpinstall/wizard/windows/setup/extra.c:965 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7762)xpinstall/wizard/windows/setup/extra.c:969 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7763)xpinstall/wizard/windows/setup/extra.c:1001 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7764)xpinstall/wizard/windows/setup/extra.c:1006 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7765)xpinstall/wizard/windows/setup/extra.c:1008 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7766)xpinstall/wizard/windows/setup/extra.c:1017 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7767)xpinstall/wizard/windows/setup/extra.c:1049 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7768)xpinstall/wizard/windows/setup/extra.c:1054 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7769)xpinstall/wizard/windows/setup/extra.c:1056 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7770)xpinstall/wizard/windows/setup/extra.c:1065 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7771)xpinstall/wizard/windows/setup/extra.c:1100 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7772)xpinstall/wizard/windows/setup/extra.c:1113 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7773)xpinstall/wizard/windows/setup/extra.c:1119 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7774)xpinstall/wizard/windows/setup/extra.c:1123 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7775)xpinstall/wizard/windows/setup/extra.c:1126 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7776)xpinstall/wizard/windows/setup/extra.c:1132 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7777)xpinstall/wizard/windows/setup/extra.c:1143 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7778)xpinstall/wizard/windows/setup/extra.c:1157 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7779)xpinstall/wizard/windows/setup/extra.c:1163 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7780)xpinstall/wizard/windows/setup/extra.c:1172 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7781)xpinstall/wizard/windows/setup/extra.c:1178 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7782)xpinstall/wizard/windows/setup/extra.c:1183 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7783)xpinstall/wizard/windows/setup/extra.c:1194 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7784)xpinstall/wizard/windows/setup/extra.c:1201 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7785)xpinstall/wizard/windows/setup/extra.c:1309 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7786)xpinstall/wizard/windows/setup/extra.c:1329 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7787)xpinstall/wizard/windows/setup/extra.c:1442 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7788)xpinstall/wizard/windows/setup/extra.c:1457 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7789)xpinstall/wizard/windows/setup/extra.c:1465 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7790)xpinstall/wizard/windows/setup/extra.c:1550 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7791)xpinstall/wizard/windows/setup/extra.c:1621 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7792)xpinstall/wizard/windows/setup/extra.c:1892 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7793)xpinstall/wizard/windows/setup/extra.c:1899 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7794)xpinstall/wizard/windows/setup/extra.c:1906 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7795)xpinstall/wizard/windows/setup/extra.c:1942 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7796)xpinstall/wizard/windows/setup/extra.c:1951 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7797)xpinstall/wizard/windows/setup/extra.c:2007 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7798)xpinstall/wizard/windows/setup/extra.c:2012 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7799)xpinstall/wizard/windows/setup/extra.c:2017 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7800)xpinstall/wizard/windows/setup/extra.c:2038 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7801)xpinstall/wizard/windows/setup/extra.c:2043 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7802)xpinstall/wizard/windows/setup/extra.c:2620 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7803)xpinstall/wizard/windows/setup/extra.c:2967 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7804)xpinstall/wizard/windows/setup/extra.c:3006 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7805)xpinstall/wizard/windows/setup/extra.c:3048 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7806)xpinstall/wizard/windows/setup/extra.c:3063 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7807)xpinstall/wizard/windows/setup/extra.c:3669 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7808)xpinstall/wizard/windows/setup/extra.c:3675 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7809)xpinstall/wizard/windows/setup/extra.c:3716 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7810)xpinstall/wizard/windows/setup/extra.c:3778 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7811)xpinstall/wizard/windows/setup/extra.c:3817 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7812)xpinstall/wizard/windows/setup/extra.c:3823 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7813)xpinstall/wizard/windows/setup/extra.c:3831 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7814)xpinstall/wizard/windows/setup/extra.c:3856 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7815)xpinstall/wizard/windows/setup/extra.c:3865 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7816)xpinstall/wizard/windows/setup/extra.c:3877 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7817)xpinstall/wizard/windows/setup/extra.c:3879 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7818)xpinstall/wizard/windows/setup/extra.c:3891 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7819)xpinstall/wizard/windows/setup/extra.c:3893 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7820)xpinstall/wizard/windows/setup/extra.c:3960 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7821)xpinstall/wizard/windows/setup/extra.c:3962 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7822)xpinstall/wizard/windows/setup/extra.c:4034 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7823)xpinstall/wizard/windows/setup/extra.c:4064 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7824)xpinstall/wizard/windows/setup/extra.c:4305 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7825)xpinstall/wizard/windows/setup/extra.c:4317 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7826)xpinstall/wizard/windows/setup/extra.c:4321 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7827)xpinstall/wizard/windows/setup/extra.c:4327 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7828)xpinstall/wizard/windows/setup/extra.c:4376 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7829)xpinstall/wizard/windows/setup/extra.c:4401 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7830)xpinstall/wizard/windows/setup/extra.c:4415 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7831)xpinstall/wizard/windows/setup/extra.c:4467 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7832)xpinstall/wizard/windows/setup/extra.c:4492 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7833)xpinstall/wizard/windows/setup/extra.c:4555 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7834)xpinstall/wizard/windows/setup/extra.c:4556 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7835)xpinstall/wizard/windows/setup/extra.c:4557 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7836)xpinstall/wizard/windows/setup/extra.c:4642 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7837)xpinstall/wizard/windows/setup/extra.c:4683 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7838)xpinstall/wizard/windows/setup/extra.c:5043 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7839)xpinstall/wizard/windows/setup/extra.c:5089 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7840)xpinstall/wizard/windows/setup/extra.c:5095 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7841)xpinstall/wizard/windows/setup/extra.c:5111 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7842)xpinstall/wizard/windows/setup/extra.c:5118 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7843)xpinstall/wizard/windows/setup/extra.c:5126 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7844)xpinstall/wizard/windows/setup/extra.c:5133 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7845)xpinstall/wizard/windows/setup/extra.c:5165 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7846)xpinstall/wizard/windows/setup/extra.c:5185 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7847)xpinstall/wizard/windows/setup/extra.c:5412 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7848)xpinstall/wizard/windows/setup/extra.c:5726 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7849)xpinstall/wizard/windows/setup/extra.c:5888 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7850)xpinstall/wizard/windows/setup/extra.c:5972 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7851)xpinstall/wizard/windows/setup/extra.c:5983 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7852)xpinstall/wizard/windows/setup/extra.c:6001 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7853)xpinstall/wizard/windows/setup/extra.c:6013 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7854)xpinstall/wizard/windows/setup/extra.c:6024 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7855)xpinstall/wizard/windows/setup/extra.c:6498 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7856)xpinstall/wizard/windows/setup/extra.c:6544 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7857)xpinstall/wizard/windows/setup/extra.c:6624 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7858)xpinstall/wizard/windows/setup/extra.c:6637 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7859)xpinstall/wizard/windows/setup/extra.c:6649 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7860)xpinstall/wizard/windows/setup/extra.c:6661 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7861)xpinstall/wizard/windows/setup/extra.c:6740 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7862)xpinstall/wizard/windows/setup/extra.c:6926 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7863)xpinstall/wizard/windows/setup/extra.c:6931 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7864)xpinstall/wizard/windows/setup/extra.c:6936 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7865)xpinstall/wizard/windows/setup/extra.c:6943 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7866)xpinstall/wizard/windows/setup/extra.c:6948 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7867)xpinstall/wizard/windows/setup/extra.c:6955 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7868)xpinstall/wizard/windows/setup/extra.c:7045 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7869)xpinstall/wizard/windows/setup/extra.c:7056 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7870)xpinstall/wizard/windows/setup/extra.c:7065 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7871)xpinstall/wizard/windows/setup/extra.c:7074 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7872)xpinstall/wizard/windows/setup/extra.c:7078 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7873)xpinstall/wizard/windows/setup/extra.c:7112 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7874)xpinstall/wizard/windows/setup/extra.c:7116 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7875)xpinstall/wizard/windows/setup/extra.c:7120 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7876)xpinstall/wizard/windows/setup/extra.c:7150 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7877)xpinstall/wizard/windows/setup/extra.c:7182 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7878)xpinstall/wizard/windows/setup/extra.c:7214 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7879)xpinstall/wizard/windows/setup/extra.c:7221 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7880)xpinstall/wizard/windows/setup/extra.c:7223 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7881)xpinstall/wizard/windows/setup/extra.c:7229 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7882)xpinstall/wizard/windows/setup/extra.c:7233 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7883)xpinstall/wizard/windows/setup/extra.c:7235 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7884)xpinstall/wizard/windows/setup/extra.c:7240 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7885)xpinstall/wizard/windows/setup/extra.c:7242 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7886)xpinstall/wizard/windows/setup/extra.c:7261 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7887)xpinstall/wizard/windows/setup/extra.c:7264 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7888)xpinstall/wizard/windows/setup/extra.c:7271 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7889)xpinstall/wizard/windows/setup/extra.c:7275 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7890)xpinstall/wizard/windows/setup/extra.c:7351 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7891)xpinstall/wizard/windows/setup/extra.c:7369 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7892)xpinstall/wizard/windows/setup/extra.c:7385 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7893)xpinstall/wizard/windows/setup/extra.c:7405 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7894)xpinstall/wizard/windows/setup/extra.c:7423 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7895)xpinstall/wizard/windows/setup/extra.c:7441 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7896)xpinstall/wizard/windows/setup/extra.c:7459 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7897)xpinstall/wizard/windows/setup/extra.c:7477 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7898)xpinstall/wizard/windows/setup/extra.c:7502 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7899)xpinstall/wizard/windows/setup/extra.c:7569 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7900)xpinstall/wizard/windows/setup/extra.c:7639 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7901)xpinstall/wizard/windows/setup/extra.c:7703 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7902)xpinstall/wizard/windows/setup/extra.c:7742 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7903)xpinstall/wizard/windows/setup/extra.c:7746 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7904)xpinstall/wizard/windows/setup/extra.c:7759 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7905)xpinstall/wizard/windows/setup/extra.c:7771 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7906)xpinstall/wizard/windows/setup/extra.c:7787 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7907)xpinstall/wizard/windows/setup/extra.c:7959 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7908)xpinstall/wizard/windows/setup/extra.c:609 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7909)xpinstall/wizard/windows/setup/extra.c:616 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7910)xpinstall/wizard/windows/setup/extra.c:3587 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r7911)xpinstall/wizard/windows/setup/extra.c:655 High: GetTempPath: GetTempPath() may return the current directory or the windows directory. Be careful what you place in these locations. Important files may be overwritten, and trojan DLL's may be dropped in these locations. Never use a user-input filename when writing to a location given by GetTempPath().
r7912)xpinstall/wizard/windows/setup/extra.c:725 High: GetTempPath: GetTempPath() may return the current directory or the windows directory. Be careful what you place in these locations. Important files may be overwritten, and trojan DLL's may be dropped in these locations. Never use a user-input filename when writing to a location given by GetTempPath().
r7913)xpinstall/wizard/windows/setup/extra.c:672 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7914)xpinstall/wizard/windows/setup/extra.c:967 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7915)xpinstall/wizard/windows/setup/extra.c:971 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7916)xpinstall/wizard/windows/setup/extra.c:1003 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7917)xpinstall/wizard/windows/setup/extra.c:1010 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7918)xpinstall/wizard/windows/setup/extra.c:1051 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7919)xpinstall/wizard/windows/setup/extra.c:1058 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7920)xpinstall/wizard/windows/setup/extra.c:1102 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7921)xpinstall/wizard/windows/setup/extra.c:1134 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7922)xpinstall/wizard/windows/setup/extra.c:1165 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7923)xpinstall/wizard/windows/setup/extra.c:1185 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7924)xpinstall/wizard/windows/setup/extra.c:1311 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7925)xpinstall/wizard/windows/setup/extra.c:1444 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7926)xpinstall/wizard/windows/setup/extra.c:1467 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7927)xpinstall/wizard/windows/setup/extra.c:1473 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7928)xpinstall/wizard/windows/setup/extra.c:1554 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7929)xpinstall/wizard/windows/setup/extra.c:1584 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7930)xpinstall/wizard/windows/setup/extra.c:1623 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7931)xpinstall/wizard/windows/setup/extra.c:2009 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7932)xpinstall/wizard/windows/setup/extra.c:2014 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7933)xpinstall/wizard/windows/setup/extra.c:2019 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7934)xpinstall/wizard/windows/setup/extra.c:2045 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7935)xpinstall/wizard/windows/setup/extra.c:2970 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7936)xpinstall/wizard/windows/setup/extra.c:2972 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7937)xpinstall/wizard/windows/setup/extra.c:3009 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7938)xpinstall/wizard/windows/setup/extra.c:3011 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7939)xpinstall/wizard/windows/setup/extra.c:3091 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7940)xpinstall/wizard/windows/setup/extra.c:3730 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7941)xpinstall/wizard/windows/setup/extra.c:4288 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7942)xpinstall/wizard/windows/setup/extra.c:4294 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7943)xpinstall/wizard/windows/setup/extra.c:4368 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7944)xpinstall/wizard/windows/setup/extra.c:4385 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7945)xpinstall/wizard/windows/setup/extra.c:4393 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7946)xpinstall/wizard/windows/setup/extra.c:4410 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7947)xpinstall/wizard/windows/setup/extra.c:4428 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7948)xpinstall/wizard/windows/setup/extra.c:4448 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7949)xpinstall/wizard/windows/setup/extra.c:4469 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7950)xpinstall/wizard/windows/setup/extra.c:4479 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7951)xpinstall/wizard/windows/setup/extra.c:4480 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7952)xpinstall/wizard/windows/setup/extra.c:4513 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7953)xpinstall/wizard/windows/setup/extra.c:4514 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7954)xpinstall/wizard/windows/setup/extra.c:4541 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7955)xpinstall/wizard/windows/setup/extra.c:4542 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7956)xpinstall/wizard/windows/setup/extra.c:4543 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7957)xpinstall/wizard/windows/setup/extra.c:4569 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7958)xpinstall/wizard/windows/setup/extra.c:4570 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7959)xpinstall/wizard/windows/setup/extra.c:4571 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7960)xpinstall/wizard/windows/setup/extra.c:4647 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7961)xpinstall/wizard/windows/setup/extra.c:4648 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7962)xpinstall/wizard/windows/setup/extra.c:4652 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7963)xpinstall/wizard/windows/setup/extra.c:4688 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7964)xpinstall/wizard/windows/setup/extra.c:4689 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7965)xpinstall/wizard/windows/setup/extra.c:4693 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7966)xpinstall/wizard/windows/setup/extra.c:4728 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7967)xpinstall/wizard/windows/setup/extra.c:4730 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7968)xpinstall/wizard/windows/setup/extra.c:4750 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7969)xpinstall/wizard/windows/setup/extra.c:4752 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7970)xpinstall/wizard/windows/setup/extra.c:5143 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7971)xpinstall/wizard/windows/setup/extra.c:5145 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7972)xpinstall/wizard/windows/setup/extra.c:5406 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7973)xpinstall/wizard/windows/setup/extra.c:5730 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7974)xpinstall/wizard/windows/setup/extra.c:5747 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7975)xpinstall/wizard/windows/setup/extra.c:5793 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7976)xpinstall/wizard/windows/setup/extra.c:5974 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7977)xpinstall/wizard/windows/setup/extra.c:5976 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7978)xpinstall/wizard/windows/setup/extra.c:5993 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7979)xpinstall/wizard/windows/setup/extra.c:5995 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7980)xpinstall/wizard/windows/setup/extra.c:6499 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7981)xpinstall/wizard/windows/setup/extra.c:6938 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7982)xpinstall/wizard/windows/setup/extra.c:7060 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7983)xpinstall/wizard/windows/setup/extra.c:7069 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7984)xpinstall/wizard/windows/setup/extra.c:7080 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7985)xpinstall/wizard/windows/setup/extra.c:7224 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7986)xpinstall/wizard/windows/setup/extra.c:7225 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7987)xpinstall/wizard/windows/setup/extra.c:7236 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7988)xpinstall/wizard/windows/setup/extra.c:7237 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7989)xpinstall/wizard/windows/setup/extra.c:7259 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7990)xpinstall/wizard/windows/setup/extra.c:7265 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7991)xpinstall/wizard/windows/setup/extra.c:7266 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7992)xpinstall/wizard/windows/setup/extra.c:7353 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7993)xpinstall/wizard/windows/setup/extra.c:7371 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7994)xpinstall/wizard/windows/setup/extra.c:7387 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7995)xpinstall/wizard/windows/setup/extra.c:7407 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7996)xpinstall/wizard/windows/setup/extra.c:7425 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7997)xpinstall/wizard/windows/setup/extra.c:7443 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7998)xpinstall/wizard/windows/setup/extra.c:7461 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r7999)xpinstall/wizard/windows/setup/extra.c:7479 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.