r8000)xpinstall/wizard/windows/setup/extra.c:7504 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8001)xpinstall/wizard/windows/setup/extra.c:7571 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8002)xpinstall/wizard/windows/setup/extra.c:7707 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8003)xpinstall/wizard/windows/setup/extra.c:7714 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8004)xpinstall/wizard/windows/setup/extra.c:7748 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8005)xpinstall/wizard/windows/setup/extra.c:7761 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8006)xpinstall/wizard/windows/setup/extra.c:7773 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8007)xpinstall/wizard/windows/setup/extra.c:7789 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8009)xpinstall/wizard/windows/setup/extra.c:730 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8011)xpinstall/wizard/windows/setup/extra.c:2227 High: ShellExecuteEx: Argument 1 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r8012)xpinstall/wizard/windows/setup/extra.c:3901 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8013)xpinstall/wizard/windows/setup/extra.c:3902 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8014)xpinstall/wizard/windows/setup/extra.c:3919 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8015)xpinstall/wizard/windows/setup/extra.c:3920 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8016)xpinstall/wizard/windows/setup/extra.c:6432 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8017)xpinstall/wizard/windows/setup/ifuncns.c:4116 Medium: srand: Standard random number generators should not be used to generate randomness used for security reasons. For security sensitive randomness a crytographic randomness generator that provides sufficient entropy should be used.
r8018)xpinstall/wizard/windows/setup/ifuncns.c:39 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8019)xpinstall/wizard/windows/setup/ifuncns.c:107 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8020)xpinstall/wizard/windows/setup/ifuncns.c:177 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8021)xpinstall/wizard/windows/setup/ifuncns.c:178 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8022)xpinstall/wizard/windows/setup/ifuncns.c:241 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8023)xpinstall/wizard/windows/setup/ifuncns.c:242 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8024)xpinstall/wizard/windows/setup/ifuncns.c:243 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8025)xpinstall/wizard/windows/setup/ifuncns.c:244 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8026)xpinstall/wizard/windows/setup/ifuncns.c:245 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8027)xpinstall/wizard/windows/setup/ifuncns.c:246 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8028)xpinstall/wizard/windows/setup/ifuncns.c:247 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8029)xpinstall/wizard/windows/setup/ifuncns.c:248 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8030)xpinstall/wizard/windows/setup/ifuncns.c:409 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8031)xpinstall/wizard/windows/setup/ifuncns.c:410 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8032)xpinstall/wizard/windows/setup/ifuncns.c:411 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8033)xpinstall/wizard/windows/setup/ifuncns.c:412 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8034)xpinstall/wizard/windows/setup/ifuncns.c:413 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8035)xpinstall/wizard/windows/setup/ifuncns.c:451 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8036)xpinstall/wizard/windows/setup/ifuncns.c:494 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8037)xpinstall/wizard/windows/setup/ifuncns.c:495 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8038)xpinstall/wizard/windows/setup/ifuncns.c:503 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8039)xpinstall/wizard/windows/setup/ifuncns.c:504 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8040)xpinstall/wizard/windows/setup/ifuncns.c:548 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8041)xpinstall/wizard/windows/setup/ifuncns.c:560 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8042)xpinstall/wizard/windows/setup/ifuncns.c:561 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8043)xpinstall/wizard/windows/setup/ifuncns.c:562 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8044)xpinstall/wizard/windows/setup/ifuncns.c:563 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8045)xpinstall/wizard/windows/setup/ifuncns.c:589 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8046)xpinstall/wizard/windows/setup/ifuncns.c:590 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8047)xpinstall/wizard/windows/setup/ifuncns.c:614 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8048)xpinstall/wizard/windows/setup/ifuncns.c:615 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8049)xpinstall/wizard/windows/setup/ifuncns.c:616 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8050)xpinstall/wizard/windows/setup/ifuncns.c:617 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8051)xpinstall/wizard/windows/setup/ifuncns.c:688 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8052)xpinstall/wizard/windows/setup/ifuncns.c:689 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8053)xpinstall/wizard/windows/setup/ifuncns.c:690 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8054)xpinstall/wizard/windows/setup/ifuncns.c:691 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8055)xpinstall/wizard/windows/setup/ifuncns.c:717 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8056)xpinstall/wizard/windows/setup/ifuncns.c:718 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8057)xpinstall/wizard/windows/setup/ifuncns.c:719 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8058)xpinstall/wizard/windows/setup/ifuncns.c:720 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8059)xpinstall/wizard/windows/setup/ifuncns.c:777 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8060)xpinstall/wizard/windows/setup/ifuncns.c:778 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8061)xpinstall/wizard/windows/setup/ifuncns.c:779 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8062)xpinstall/wizard/windows/setup/ifuncns.c:780 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8063)xpinstall/wizard/windows/setup/ifuncns.c:781 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8064)xpinstall/wizard/windows/setup/ifuncns.c:782 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8065)xpinstall/wizard/windows/setup/ifuncns.c:783 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8066)xpinstall/wizard/windows/setup/ifuncns.c:870 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8067)xpinstall/wizard/windows/setup/ifuncns.c:871 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8068)xpinstall/wizard/windows/setup/ifuncns.c:872 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8069)xpinstall/wizard/windows/setup/ifuncns.c:873 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8070)xpinstall/wizard/windows/setup/ifuncns.c:913 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8071)xpinstall/wizard/windows/setup/ifuncns.c:914 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8072)xpinstall/wizard/windows/setup/ifuncns.c:915 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8073)xpinstall/wizard/windows/setup/ifuncns.c:916 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8074)xpinstall/wizard/windows/setup/ifuncns.c:917 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8075)xpinstall/wizard/windows/setup/ifuncns.c:962 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8076)xpinstall/wizard/windows/setup/ifuncns.c:1011 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8077)xpinstall/wizard/windows/setup/ifuncns.c:1012 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8078)xpinstall/wizard/windows/setup/ifuncns.c:1013 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8079)xpinstall/wizard/windows/setup/ifuncns.c:1014 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8080)xpinstall/wizard/windows/setup/ifuncns.c:1038 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8081)xpinstall/wizard/windows/setup/ifuncns.c:1039 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8082)xpinstall/wizard/windows/setup/ifuncns.c:1072 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8083)xpinstall/wizard/windows/setup/ifuncns.c:1100 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8084)xpinstall/wizard/windows/setup/ifuncns.c:1101 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8085)xpinstall/wizard/windows/setup/ifuncns.c:1155 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8086)xpinstall/wizard/windows/setup/ifuncns.c:1183 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8087)xpinstall/wizard/windows/setup/ifuncns.c:1184 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8088)xpinstall/wizard/windows/setup/ifuncns.c:1185 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8089)xpinstall/wizard/windows/setup/ifuncns.c:1210 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8090)xpinstall/wizard/windows/setup/ifuncns.c:1211 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8091)xpinstall/wizard/windows/setup/ifuncns.c:1251 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8092)xpinstall/wizard/windows/setup/ifuncns.c:1252 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8093)xpinstall/wizard/windows/setup/ifuncns.c:1253 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8094)xpinstall/wizard/windows/setup/ifuncns.c:1277 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8095)xpinstall/wizard/windows/setup/ifuncns.c:1323 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8096)xpinstall/wizard/windows/setup/ifuncns.c:1324 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8097)xpinstall/wizard/windows/setup/ifuncns.c:1325 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8098)xpinstall/wizard/windows/setup/ifuncns.c:1354 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8099)xpinstall/wizard/windows/setup/ifuncns.c:1355 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8100)xpinstall/wizard/windows/setup/ifuncns.c:1356 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8101)xpinstall/wizard/windows/setup/ifuncns.c:1357 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8102)xpinstall/wizard/windows/setup/ifuncns.c:1358 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8103)xpinstall/wizard/windows/setup/ifuncns.c:1570 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8104)xpinstall/wizard/windows/setup/ifuncns.c:1596 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8105)xpinstall/wizard/windows/setup/ifuncns.c:1597 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8106)xpinstall/wizard/windows/setup/ifuncns.c:1660 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8107)xpinstall/wizard/windows/setup/ifuncns.c:1704 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8108)xpinstall/wizard/windows/setup/ifuncns.c:1705 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8109)xpinstall/wizard/windows/setup/ifuncns.c:1794 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8111)xpinstall/wizard/windows/setup/ifuncns.c:1844 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8112)xpinstall/wizard/windows/setup/ifuncns.c:1861 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8113)xpinstall/wizard/windows/setup/ifuncns.c:1862 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8114)xpinstall/wizard/windows/setup/ifuncns.c:1863 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8115)xpinstall/wizard/windows/setup/ifuncns.c:1864 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8116)xpinstall/wizard/windows/setup/ifuncns.c:1865 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8117)xpinstall/wizard/windows/setup/ifuncns.c:1866 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8118)xpinstall/wizard/windows/setup/ifuncns.c:1867 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8119)xpinstall/wizard/windows/setup/ifuncns.c:1868 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8120)xpinstall/wizard/windows/setup/ifuncns.c:1995 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8121)xpinstall/wizard/windows/setup/ifuncns.c:1996 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8122)xpinstall/wizard/windows/setup/ifuncns.c:1997 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8123)xpinstall/wizard/windows/setup/ifuncns.c:1998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8124)xpinstall/wizard/windows/setup/ifuncns.c:1999 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8125)xpinstall/wizard/windows/setup/ifuncns.c:2000 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8126)xpinstall/wizard/windows/setup/ifuncns.c:2001 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8127)xpinstall/wizard/windows/setup/ifuncns.c:2002 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8128)xpinstall/wizard/windows/setup/ifuncns.c:2003 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8129)xpinstall/wizard/windows/setup/ifuncns.c:2004 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8130)xpinstall/wizard/windows/setup/ifuncns.c:2071 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8131)xpinstall/wizard/windows/setup/ifuncns.c:2072 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8132)xpinstall/wizard/windows/setup/ifuncns.c:2073 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8133)xpinstall/wizard/windows/setup/ifuncns.c:2124 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8134)xpinstall/wizard/windows/setup/ifuncns.c:2125 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8135)xpinstall/wizard/windows/setup/ifuncns.c:2126 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8136)xpinstall/wizard/windows/setup/ifuncns.c:2127 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8137)xpinstall/wizard/windows/setup/ifuncns.c:2128 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8138)xpinstall/wizard/windows/setup/ifuncns.c:2129 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8139)xpinstall/wizard/windows/setup/ifuncns.c:2130 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8140)xpinstall/wizard/windows/setup/ifuncns.c:2170 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8141)xpinstall/wizard/windows/setup/ifuncns.c:2171 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8142)xpinstall/wizard/windows/setup/ifuncns.c:2172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8143)xpinstall/wizard/windows/setup/ifuncns.c:169 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8144)xpinstall/wizard/windows/setup/ifuncns.c:255 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8145)xpinstall/wizard/windows/setup/ifuncns.c:430 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8146)xpinstall/wizard/windows/setup/ifuncns.c:469 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8147)xpinstall/wizard/windows/setup/ifuncns.c:520 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8148)xpinstall/wizard/windows/setup/ifuncns.c:524 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8149)xpinstall/wizard/windows/setup/ifuncns.c:637 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8150)xpinstall/wizard/windows/setup/ifuncns.c:662 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8151)xpinstall/wizard/windows/setup/ifuncns.c:667 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8152)xpinstall/wizard/windows/setup/ifuncns.c:727 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8153)xpinstall/wizard/windows/setup/ifuncns.c:751 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8154)xpinstall/wizard/windows/setup/ifuncns.c:756 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8155)xpinstall/wizard/windows/setup/ifuncns.c:791 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8156)xpinstall/wizard/windows/setup/ifuncns.c:806 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8157)xpinstall/wizard/windows/setup/ifuncns.c:807 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8158)xpinstall/wizard/windows/setup/ifuncns.c:808 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8159)xpinstall/wizard/windows/setup/ifuncns.c:813 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8160)xpinstall/wizard/windows/setup/ifuncns.c:814 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8161)xpinstall/wizard/windows/setup/ifuncns.c:819 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8162)xpinstall/wizard/windows/setup/ifuncns.c:838 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8163)xpinstall/wizard/windows/setup/ifuncns.c:849 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8164)xpinstall/wizard/windows/setup/ifuncns.c:968 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8165)xpinstall/wizard/windows/setup/ifuncns.c:979 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8166)xpinstall/wizard/windows/setup/ifuncns.c:993 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8167)xpinstall/wizard/windows/setup/ifuncns.c:1043 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8168)xpinstall/wizard/windows/setup/ifuncns.c:1048 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8169)xpinstall/wizard/windows/setup/ifuncns.c:1076 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8170)xpinstall/wizard/windows/setup/ifuncns.c:1081 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8171)xpinstall/wizard/windows/setup/ifuncns.c:1105 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8172)xpinstall/wizard/windows/setup/ifuncns.c:1234 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8173)xpinstall/wizard/windows/setup/ifuncns.c:1285 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8174)xpinstall/wizard/windows/setup/ifuncns.c:1296 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8175)xpinstall/wizard/windows/setup/ifuncns.c:1621 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8176)xpinstall/wizard/windows/setup/ifuncns.c:1895 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8177)xpinstall/wizard/windows/setup/ifuncns.c:1909 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8178)xpinstall/wizard/windows/setup/ifuncns.c:1922 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8179)xpinstall/wizard/windows/setup/ifuncns.c:2017 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8180)xpinstall/wizard/windows/setup/ifuncns.c:2045 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8181)xpinstall/wizard/windows/setup/ifuncns.c:2053 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8182)xpinstall/wizard/windows/setup/ifuncns.c:259 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8183)xpinstall/wizard/windows/setup/ifuncns.c:291 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8184)xpinstall/wizard/windows/setup/ifuncns.c:434 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8185)xpinstall/wizard/windows/setup/ifuncns.c:640 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8186)xpinstall/wizard/windows/setup/ifuncns.c:664 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8187)xpinstall/wizard/windows/setup/ifuncns.c:669 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8188)xpinstall/wizard/windows/setup/ifuncns.c:729 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8189)xpinstall/wizard/windows/setup/ifuncns.c:753 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8190)xpinstall/wizard/windows/setup/ifuncns.c:758 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8191)xpinstall/wizard/windows/setup/ifuncns.c:793 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8192)xpinstall/wizard/windows/setup/ifuncns.c:821 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8193)xpinstall/wizard/windows/setup/ifuncns.c:851 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8194)xpinstall/wizard/windows/setup/ifuncns.c:853 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8195)xpinstall/wizard/windows/setup/ifuncns.c:858 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8196)xpinstall/wizard/windows/setup/ifuncns.c:970 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8197)xpinstall/wizard/windows/setup/ifuncns.c:981 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8198)xpinstall/wizard/windows/setup/ifuncns.c:995 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8199)xpinstall/wizard/windows/setup/ifuncns.c:1050 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8200)xpinstall/wizard/windows/setup/ifuncns.c:1055 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8201)xpinstall/wizard/windows/setup/ifuncns.c:1083 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8202)xpinstall/wizard/windows/setup/ifuncns.c:1088 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8203)xpinstall/wizard/windows/setup/ifuncns.c:1109 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8204)xpinstall/wizard/windows/setup/ifuncns.c:1114 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8205)xpinstall/wizard/windows/setup/ifuncns.c:1236 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8206)xpinstall/wizard/windows/setup/ifuncns.c:1298 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8207)xpinstall/wizard/windows/setup/ifuncns.c:1389 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8208)xpinstall/wizard/windows/setup/ifuncns.c:1623 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8209)xpinstall/wizard/windows/setup/ifuncns.c:2019 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8210)xpinstall/wizard/windows/setup/ifuncns.c:2047 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8211)xpinstall/wizard/windows/setup/ifuncns.c:2055 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8216)xpinstall/wizard/windows/setup/ifuncns.c:511 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8217)xpinstall/wizard/windows/setup/ifuncns.c:550 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8218)xpinstall/wizard/windows/setup/ifuncns.c:594 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8219)xpinstall/wizard/windows/setup/ifuncns.c:2176 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8220)xpinstall/wizard/windows/setup/ifuncns.c:947 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8221)xpinstall/wizard/windows/setup/logging.c:1847 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8222)xpinstall/wizard/windows/setup/logging.c:1849 High: strcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8223)xpinstall/wizard/windows/setup/logging.c:51 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8224)xpinstall/wizard/windows/setup/logging.c:544 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8225)xpinstall/wizard/windows/setup/setup.c:59 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8226)xpinstall/wizard/windows/setup/setup.c:60 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8227)xpinstall/wizard/windows/setup/setup.c:61 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8228)xpinstall/wizard/windows/setup/setup.c:88 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8229)xpinstall/wizard/windows/setup/setup.c:119 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8230)xpinstall/wizard/windows/setup/setup.c:130 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8231)xpinstall/wizard/windows/setup/setup.c:139 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8232)xpinstall/wizard/windows/setup/setup.c:169 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8233)xpinstall/wizard/windows/setup/setup.c:210 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8234)xpinstall/wizard/windows/setup/setup.c:211 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8235)xpinstall/wizard/windows/setup/setup.c:267 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8236)xpinstall/wizard/windows/setup/setup.c:268 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8237)xpinstall/wizard/windows/setup/setup.c:287 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8238)xpinstall/wizard/windows/setup/setup.c:323 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8239)xpinstall/wizard/windows/setup/setup.c:351 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8240)xpinstall/wizard/windows/setup/setup.c:363 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8241)xpinstall/wizard/windows/setup/setup.c:371 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8242)xpinstall/wizard/windows/setup/setup.c:372 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8243)xpinstall/wizard/windows/setup/setup.c:381 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8244)xpinstall/wizard/windows/setup/setup.c:393 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8245)xpinstall/wizard/windows/setup/setup.c:401 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8246)xpinstall/wizard/windows/setup/setup.c:409 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8247)xpinstall/wizard/windows/setup/setup.c:423 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8248)xpinstall/wizard/windows/setup/setup.c:424 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8249)xpinstall/wizard/windows/setup/setup.c:425 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8250)xpinstall/wizard/windows/setup/setup.c:454 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8251)xpinstall/wizard/windows/setup/setup.c:466 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8252)xpinstall/wizard/windows/setup/setup.c:467 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8253)xpinstall/wizard/windows/setup/setup.c:493 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8254)xpinstall/wizard/windows/setup/setup.c:494 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8255)xpinstall/wizard/windows/setup/setup.c:513 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8256)xpinstall/wizard/windows/setup/setup.c:524 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8257)xpinstall/wizard/windows/setup/setup.c:535 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8258)xpinstall/wizard/windows/setup/setup.c:556 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8259)xpinstall/wizard/windows/setup/setup.c:579 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8260)xpinstall/wizard/windows/setup/setup.c:125 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8261)xpinstall/wizard/windows/setup/setup.c:148 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8262)xpinstall/wizard/windows/setup/setup.c:159 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8263)xpinstall/wizard/windows/setup/setup.c:152 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r8264)xpinstall/wizard/windows/setup/setup.c:163 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r8265)xpinstall/wizard/windows/setup/xpi.c:152 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8266)xpinstall/wizard/windows/setup/xpi.c:163 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8267)xpinstall/wizard/windows/setup/xpi.c:72 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8268)xpinstall/wizard/windows/setup/xpi.c:73 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8269)xpinstall/wizard/windows/setup/xpi.c:74 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8270)xpinstall/wizard/windows/setup/xpi.c:171 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8271)xpinstall/wizard/windows/setup/xpi.c:219 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8272)xpinstall/wizard/windows/setup/xpi.c:220 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8273)xpinstall/wizard/windows/setup/xpi.c:221 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8274)xpinstall/wizard/windows/setup/xpi.c:222 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8275)xpinstall/wizard/windows/setup/xpi.c:223 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8276)xpinstall/wizard/windows/setup/xpi.c:290 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8277)xpinstall/wizard/windows/setup/xpi.c:323 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8278)xpinstall/wizard/windows/setup/xpi.c:381 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8279)xpinstall/wizard/windows/setup/xpi.c:382 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8280)xpinstall/wizard/windows/setup/xpi.c:383 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8281)xpinstall/wizard/windows/setup/xpi.c:83 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8282)xpinstall/wizard/windows/setup/xpi.c:98 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8283)xpinstall/wizard/windows/setup/xpi.c:185 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8284)xpinstall/wizard/windows/setup/xpi.c:240 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8285)xpinstall/wizard/windows/setup/xpi.c:275 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8286)xpinstall/wizard/windows/setup/xpi.c:280 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8287)xpinstall/wizard/windows/setup/xpi.c:285 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8288)xpinstall/wizard/windows/setup/xpi.c:90 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8289)xpinstall/wizard/windows/setup/xpi.c:106 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8298)xpinstall/wizard/windows/setup/xpi.c:108 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8299)xpinstall/wizard/windows/setup/xpi.c:114 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8300)xpinstall/wizard/windows/setup/xpi.c:120 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8301)xpinstall/wizard/windows/setup/xpi.c:126 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8302)xpinstall/wizard/windows/setup/xpi.c:294 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8303)xpinstall/wizard/windows/setup/xpi.c:309 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8304)xpinstall/wizard/windows/setup/xpi.c:391 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8305)xpinstall/wizard/windows/setup/xpi.c:409 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8306)xpinstall/wizard/windows/setup/setup.h:244 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8307)xpinstall/wizard/windows/setup/setup.h:277 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8308)xpinstall/wizard/windows/setup/setup.h:282 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8309)xpinstall/wizard/windows/setup/setup.h:287 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8310)xpinstall/wizard/windows/test/testxpi.c:486 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8311)xpinstall/wizard/windows/test/testxpi.c:487 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8312)xpinstall/wizard/windows/test/testxpi.c:488 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8313)xpinstall/wizard/windows/test/testxpi.c:489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8314)xpinstall/wizard/windows/test/testxpi.c:490 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8315)xpinstall/wizard/windows/test/testxpi.c:491 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8316)xpinstall/wizard/windows/test/testxpi.c:492 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8317)xpinstall/wizard/windows/test/testxpi.c:493 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8318)xpinstall/wizard/windows/test/testxpi.c:494 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8319)xpinstall/wizard/windows/test/testxpi.c:495 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8320)xpinstall/wizard/windows/test/testxpi.c:496 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8321)xpinstall/wizard/windows/test/testxpi.c:497 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8322)xpinstall/wizard/windows/test/testxpi.c:498 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8323)xpinstall/wizard/windows/test/testxpi.c:499 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8324)xpinstall/wizard/windows/test/testxpi.c:500 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8325)xpinstall/wizard/windows/test/testxpi.c:501 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8326)xpinstall/wizard/windows/test/testxpi.c:502 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8327)xpinstall/wizard/windows/test/testxpi.c:503 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8328)xpinstall/wizard/windows/test/testxpi.c:504 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8329)xpinstall/wizard/windows/test/testxpi.c:505 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8330)xpinstall/wizard/windows/test/testxpi.c:506 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8331)xpinstall/wizard/windows/test/testxpi.c:507 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8332)xpinstall/wizard/windows/test/testxpi.c:508 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8333)xpinstall/wizard/windows/test/testxpi.c:509 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8334)xpinstall/wizard/windows/test/testxpi.c:510 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8335)xpinstall/wizard/windows/test/testxpi.c:511 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8336)xpinstall/wizard/windows/test/testxpi.c:512 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8337)xpinstall/wizard/windows/test/testxpi.c:513 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8338)xpinstall/wizard/windows/test/testxpi.c:514 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8339)xpinstall/wizard/windows/test/testxpi.c:515 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8340)xpinstall/wizard/windows/test/testxpi.c:516 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8341)xpinstall/wizard/windows/test/testxpi.c:517 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8342)xpinstall/wizard/windows/test/testxpi.c:518 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8343)xpinstall/wizard/windows/test/testxpi.c:519 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8344)xpinstall/wizard/windows/test/testxpi.c:520 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8345)xpinstall/wizard/windows/test/testxpi.c:521 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8346)xpinstall/wizard/windows/test/testxpi.c:522 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8347)xpinstall/wizard/windows/test/testxpi.c:523 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8348)xpinstall/wizard/windows/test/testxpi.c:524 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8349)xpinstall/wizard/windows/test/testxpi.c:525 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8350)xpinstall/wizard/windows/test/testxpi.c:526 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8351)xpinstall/wizard/windows/test/testxpi.c:527 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8352)xpinstall/wizard/windows/test/testxpi.c:528 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8353)xpinstall/wizard/windows/test/testxpi.c:529 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8354)xpinstall/wizard/windows/test/testxpi.c:530 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8355)xpinstall/wizard/windows/test/testxpi.c:537 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8356)xpinstall/wizard/windows/test/testxpi.c:538 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8357)xpinstall/wizard/windows/test/testxpi.c:554 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8358)xpinstall/wizard/windows/test/testxpi.c:34 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8359)xpinstall/wizard/windows/test/testxpi.c:46 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8360)xpinstall/wizard/windows/test/testxpi.c:368 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8361)xpinstall/wizard/windows/test/testxpi.c:369 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8362)xpinstall/wizard/windows/test/testxpi.c:370 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8363)xpinstall/wizard/windows/test/xpi.c:78 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8364)xpinstall/wizard/windows/test/xpi.c:145 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8365)xpinstall/wizard/windows/test/xpi.c:151 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8366)xpinstall/wizard/windows/test/xpi.c:160 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8367)xpinstall/wizard/windows/test/xpi.c:167 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8368)xpinstall/wizard/windows/test/xpi.c:39 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8369)xpinstall/wizard/windows/test/xpi.c:40 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8370)xpinstall/wizard/windows/test/xpi.c:102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8371)xpinstall/wizard/windows/test/xpi.c:158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8373)xpinstall/wizard/windows/uninstall/dialogs.c:34 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8374)xpinstall/wizard/windows/uninstall/dialogs.c:35 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8375)xpinstall/wizard/windows/uninstall/dialogs.c:46 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8376)xpinstall/wizard/windows/uninstall/dialogs.c:47 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8377)xpinstall/wizard/windows/uninstall/dialogs.c:48 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8378)xpinstall/wizard/windows/uninstall/dialogs.c:49 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8379)xpinstall/wizard/windows/uninstall/dialogs.c:50 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8380)xpinstall/wizard/windows/uninstall/dialogs.c:51 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8381)xpinstall/wizard/windows/uninstall/dialogs.c:52 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8382)xpinstall/wizard/windows/uninstall/dialogs.c:53 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8383)xpinstall/wizard/windows/uninstall/dialogs.c:207 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8384)xpinstall/wizard/windows/uninstall/dialogs.c:208 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8385)xpinstall/wizard/windows/uninstall/dialogs.c:269 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8386)xpinstall/wizard/windows/uninstall/dialogs.c:317 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8387)xpinstall/wizard/windows/uninstall/dialogs.c:463 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8388)xpinstall/wizard/windows/uninstall/dialogs.c:484 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8389)xpinstall/wizard/windows/uninstall/dialogs.c:489 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8390)xpinstall/wizard/windows/uninstall/dialogs.c:95 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8391)xpinstall/wizard/windows/uninstall/dialogs.c:101 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8392)xpinstall/wizard/windows/uninstall/dialogs.c:124 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8393)xpinstall/wizard/windows/uninstall/dialogs.c:137 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8394)xpinstall/wizard/windows/uninstall/dialogs.c:143 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8395)xpinstall/wizard/windows/uninstall/dialogs.c:177 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8396)xpinstall/wizard/windows/uninstall/dialogs.c:182 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8397)xpinstall/wizard/windows/uninstall/dialogs.c:234 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8398)xpinstall/wizard/windows/uninstall/dialogs.c:247 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8399)xpinstall/wizard/windows/uninstall/dialogs.c:123 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8400)xpinstall/wizard/windows/uninstall/dialogs.c:232 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8401)xpinstall/wizard/windows/uninstall/dialogs.c:276 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r8402)xpinstall/wizard/windows/uninstall/dialogs.c:493 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r8403)xpinstall/wizard/windows/uninstall/extra.c:276 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8404)xpinstall/wizard/windows/uninstall/extra.c:493 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8405)xpinstall/wizard/windows/uninstall/extra.c:69 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8406)xpinstall/wizard/windows/uninstall/extra.c:116 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8407)xpinstall/wizard/windows/uninstall/extra.c:136 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8408)xpinstall/wizard/windows/uninstall/extra.c:158 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8409)xpinstall/wizard/windows/uninstall/extra.c:225 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8410)xpinstall/wizard/windows/uninstall/extra.c:248 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8411)xpinstall/wizard/windows/uninstall/extra.c:615 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8412)xpinstall/wizard/windows/uninstall/extra.c:857 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8413)xpinstall/wizard/windows/uninstall/extra.c:925 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8414)xpinstall/wizard/windows/uninstall/extra.c:926 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8415)xpinstall/wizard/windows/uninstall/extra.c:927 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8416)xpinstall/wizard/windows/uninstall/extra.c:928 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8417)xpinstall/wizard/windows/uninstall/extra.c:929 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8418)xpinstall/wizard/windows/uninstall/extra.c:930 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8419)xpinstall/wizard/windows/uninstall/extra.c:997 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8420)xpinstall/wizard/windows/uninstall/extra.c:998 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8421)xpinstall/wizard/windows/uninstall/extra.c:999 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8422)xpinstall/wizard/windows/uninstall/extra.c:1000 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8423)xpinstall/wizard/windows/uninstall/extra.c:1001 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8424)xpinstall/wizard/windows/uninstall/extra.c:1180 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8425)xpinstall/wizard/windows/uninstall/extra.c:1219 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8426)xpinstall/wizard/windows/uninstall/extra.c:1220 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8427)xpinstall/wizard/windows/uninstall/extra.c:1221 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8428)xpinstall/wizard/windows/uninstall/extra.c:1222 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8429)xpinstall/wizard/windows/uninstall/extra.c:1223 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8430)xpinstall/wizard/windows/uninstall/extra.c:1224 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8431)xpinstall/wizard/windows/uninstall/extra.c:1263 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8432)xpinstall/wizard/windows/uninstall/extra.c:1282 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8433)xpinstall/wizard/windows/uninstall/extra.c:1303 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8434)xpinstall/wizard/windows/uninstall/extra.c:1304 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8435)xpinstall/wizard/windows/uninstall/extra.c:1349 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8436)xpinstall/wizard/windows/uninstall/extra.c:1358 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8437)xpinstall/wizard/windows/uninstall/extra.c:1359 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8438)xpinstall/wizard/windows/uninstall/extra.c:1423 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8439)xpinstall/wizard/windows/uninstall/extra.c:1424 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8440)xpinstall/wizard/windows/uninstall/extra.c:1425 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8441)xpinstall/wizard/windows/uninstall/extra.c:1451 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8442)xpinstall/wizard/windows/uninstall/extra.c:1452 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8443)xpinstall/wizard/windows/uninstall/extra.c:1453 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8444)xpinstall/wizard/windows/uninstall/extra.c:1454 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8445)xpinstall/wizard/windows/uninstall/extra.c:1455 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8446)xpinstall/wizard/windows/uninstall/extra.c:1456 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8447)xpinstall/wizard/windows/uninstall/extra.c:1457 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8448)xpinstall/wizard/windows/uninstall/extra.c:1528 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8449)xpinstall/wizard/windows/uninstall/extra.c:1529 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8450)xpinstall/wizard/windows/uninstall/extra.c:1530 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8451)xpinstall/wizard/windows/uninstall/extra.c:1532 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8452)xpinstall/wizard/windows/uninstall/extra.c:1533 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8453)xpinstall/wizard/windows/uninstall/extra.c:1534 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8454)xpinstall/wizard/windows/uninstall/extra.c:1638 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8455)xpinstall/wizard/windows/uninstall/extra.c:1662 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8456)xpinstall/wizard/windows/uninstall/extra.c:1703 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8457)xpinstall/wizard/windows/uninstall/extra.c:1704 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8458)xpinstall/wizard/windows/uninstall/extra.c:1705 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8459)xpinstall/wizard/windows/uninstall/extra.c:1706 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8460)xpinstall/wizard/windows/uninstall/extra.c:1892 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8461)xpinstall/wizard/windows/uninstall/extra.c:1916 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8462)xpinstall/wizard/windows/uninstall/extra.c:1930 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8463)xpinstall/wizard/windows/uninstall/extra.c:1965 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8464)xpinstall/wizard/windows/uninstall/extra.c:1982 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8465)xpinstall/wizard/windows/uninstall/extra.c:2003 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8466)xpinstall/wizard/windows/uninstall/extra.c:2004 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8467)xpinstall/wizard/windows/uninstall/extra.c:2005 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8468)xpinstall/wizard/windows/uninstall/extra.c:2006 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8469)xpinstall/wizard/windows/uninstall/extra.c:2007 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8475)xpinstall/wizard/windows/uninstall/extra.c:126 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8476)xpinstall/wizard/windows/uninstall/extra.c:143 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8477)xpinstall/wizard/windows/uninstall/extra.c:254 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8478)xpinstall/wizard/windows/uninstall/extra.c:1187 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8479)xpinstall/wizard/windows/uninstall/extra.c:1515 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.
r8480)xpinstall/wizard/windows/uninstall/extra.c:179 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8481)xpinstall/wizard/windows/uninstall/extra.c:208 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8482)xpinstall/wizard/windows/uninstall/extra.c:215 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8483)xpinstall/wizard/windows/uninstall/extra.c:238 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8484)xpinstall/wizard/windows/uninstall/extra.c:281 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8485)xpinstall/wizard/windows/uninstall/extra.c:555 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8486)xpinstall/wizard/windows/uninstall/extra.c:561 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8487)xpinstall/wizard/windows/uninstall/extra.c:570 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8488)xpinstall/wizard/windows/uninstall/extra.c:577 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8489)xpinstall/wizard/windows/uninstall/extra.c:1327 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8490)xpinstall/wizard/windows/uninstall/extra.c:1389 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8491)xpinstall/wizard/windows/uninstall/extra.c:1464 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8492)xpinstall/wizard/windows/uninstall/extra.c:1493 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8493)xpinstall/wizard/windows/uninstall/extra.c:1521 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8494)xpinstall/wizard/windows/uninstall/extra.c:1539 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8495)xpinstall/wizard/windows/uninstall/extra.c:1876 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8496)xpinstall/wizard/windows/uninstall/extra.c:1883 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8497)xpinstall/wizard/windows/uninstall/extra.c:1949 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8498)xpinstall/wizard/windows/uninstall/extra.c:1961 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8499)xpinstall/wizard/windows/uninstall/extra.c:2019 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8500)xpinstall/wizard/windows/uninstall/extra.c:2051 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8501)xpinstall/wizard/windows/uninstall/extra.c:2064 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8502)xpinstall/wizard/windows/uninstall/extra.c:2067 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8503)xpinstall/wizard/windows/uninstall/extra.c:2074 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8504)xpinstall/wizard/windows/uninstall/extra.c:2078 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8505)xpinstall/wizard/windows/uninstall/extra.c:210 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8506)xpinstall/wizard/windows/uninstall/extra.c:218 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8507)xpinstall/wizard/windows/uninstall/extra.c:240 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8508)xpinstall/wizard/windows/uninstall/extra.c:1021 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8509)xpinstall/wizard/windows/uninstall/extra.c:1243 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8510)xpinstall/wizard/windows/uninstall/extra.c:1466 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8511)xpinstall/wizard/windows/uninstall/extra.c:1486 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8512)xpinstall/wizard/windows/uninstall/extra.c:1506 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8513)xpinstall/wizard/windows/uninstall/extra.c:1508 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8514)xpinstall/wizard/windows/uninstall/extra.c:1512 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8515)xpinstall/wizard/windows/uninstall/extra.c:1968 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8516)xpinstall/wizard/windows/uninstall/extra.c:1970 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8517)xpinstall/wizard/windows/uninstall/extra.c:1985 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8518)xpinstall/wizard/windows/uninstall/extra.c:1987 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8519)xpinstall/wizard/windows/uninstall/extra.c:2062 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8520)xpinstall/wizard/windows/uninstall/extra.c:2068 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8521)xpinstall/wizard/windows/uninstall/extra.c:2069 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8522)xpinstall/wizard/windows/uninstall/extra.c:221 High: GetTempPath: GetTempPath() may return the current directory or the windows directory. Be careful what you place in these locations. Important files may be overwritten, and trojan DLL's may be dropped in these locations. Never use a user-input filename when writing to a location given by GetTempPath().
r8524)xpinstall/wizard/windows/uninstall/extra.c:702 High: ShellExecuteEx: Argument 1 to this function call should be checked to ensure that it does not come from an untrusted source without first verifying that it contains nothing dangerous.
r8525)xpinstall/wizard/windows/uninstall/extra.c:842 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8526)xpinstall/wizard/windows/uninstall/ifuncns.c:1316 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8527)xpinstall/wizard/windows/uninstall/ifuncns.c:1473 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8528)xpinstall/wizard/windows/uninstall/ifuncns.c:1565 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8529)xpinstall/wizard/windows/uninstall/ifuncns.c:1584 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8530)xpinstall/wizard/windows/uninstall/ifuncns.c:1616 High: strcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8531)xpinstall/wizard/windows/uninstall/ifuncns.c:30 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8532)xpinstall/wizard/windows/uninstall/ifuncns.c:31 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8533)xpinstall/wizard/windows/uninstall/ifuncns.c:32 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8534)xpinstall/wizard/windows/uninstall/ifuncns.c:33 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8535)xpinstall/wizard/windows/uninstall/ifuncns.c:80 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8536)xpinstall/wizard/windows/uninstall/ifuncns.c:81 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8537)xpinstall/wizard/windows/uninstall/ifuncns.c:82 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8538)xpinstall/wizard/windows/uninstall/ifuncns.c:83 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8539)xpinstall/wizard/windows/uninstall/ifuncns.c:141 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8540)xpinstall/wizard/windows/uninstall/ifuncns.c:142 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8541)xpinstall/wizard/windows/uninstall/ifuncns.c:143 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8542)xpinstall/wizard/windows/uninstall/ifuncns.c:144 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8543)xpinstall/wizard/windows/uninstall/ifuncns.c:195 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8544)xpinstall/wizard/windows/uninstall/ifuncns.c:218 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8545)xpinstall/wizard/windows/uninstall/ifuncns.c:219 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8546)xpinstall/wizard/windows/uninstall/ifuncns.c:260 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8547)xpinstall/wizard/windows/uninstall/ifuncns.c:98 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8548)xpinstall/wizard/windows/uninstall/ifuncns.c:118 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8549)xpinstall/wizard/windows/uninstall/ifuncns.c:123 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8550)xpinstall/wizard/windows/uninstall/ifuncns.c:151 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8551)xpinstall/wizard/windows/uninstall/ifuncns.c:172 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8552)xpinstall/wizard/windows/uninstall/ifuncns.c:177 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8553)xpinstall/wizard/windows/uninstall/ifuncns.c:242 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8554)xpinstall/wizard/windows/uninstall/ifuncns.c:268 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8555)xpinstall/wizard/windows/uninstall/ifuncns.c:279 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8556)xpinstall/wizard/windows/uninstall/parser.c:101 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8557)xpinstall/wizard/windows/uninstall/parser.c:120 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8558)xpinstall/wizard/windows/uninstall/parser.c:125 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8559)xpinstall/wizard/windows/uninstall/parser.c:153 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8560)xpinstall/wizard/windows/uninstall/parser.c:174 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8561)xpinstall/wizard/windows/uninstall/parser.c:179 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8562)xpinstall/wizard/windows/uninstall/parser.c:244 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8563)xpinstall/wizard/windows/uninstall/parser.c:281 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8564)xpinstall/wizard/windows/uninstall/parser.c:37 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8565)xpinstall/wizard/windows/uninstall/parser.c:38 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8566)xpinstall/wizard/windows/uninstall/parser.c:80 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8567)xpinstall/wizard/windows/uninstall/parser.c:81 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8568)xpinstall/wizard/windows/uninstall/parser.c:82 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8569)xpinstall/wizard/windows/uninstall/parser.c:102 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8570)xpinstall/wizard/windows/uninstall/parser.c:172 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8571)xpinstall/wizard/windows/uninstall/parser.c:173 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8572)xpinstall/wizard/windows/uninstall/parser.c:234 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8573)xpinstall/wizard/windows/uninstall/parser.c:258 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8574)xpinstall/wizard/windows/uninstall/parser.c:285 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8575)xpinstall/wizard/windows/uninstall/parser.c:430 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8576)xpinstall/wizard/windows/uninstall/parser.c:431 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8577)xpinstall/wizard/windows/uninstall/parser.c:496 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8578)xpinstall/wizard/windows/uninstall/parser.c:497 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8579)xpinstall/wizard/windows/uninstall/parser.c:498 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8580)xpinstall/wizard/windows/uninstall/parser.c:499 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8581)xpinstall/wizard/windows/uninstall/parser.c:500 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8582)xpinstall/wizard/windows/uninstall/parser.c:627 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8583)xpinstall/wizard/windows/uninstall/parser.c:628 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8584)xpinstall/wizard/windows/uninstall/parser.c:629 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8585)xpinstall/wizard/windows/uninstall/parser.c:630 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8586)xpinstall/wizard/windows/uninstall/parser.c:631 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8587)xpinstall/wizard/windows/uninstall/parser.c:53 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8588)xpinstall/wizard/windows/uninstall/parser.c:92 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8590)xpinstall/wizard/windows/uninstall/parser.c:197 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8592)xpinstall/wizard/windows/uninstall/parser.c:249 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8593)xpinstall/wizard/windows/uninstall/parser.c:270 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8594)xpinstall/wizard/windows/uninstall/parser.c:275 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8595)xpinstall/wizard/windows/uninstall/parser.c:291 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8596)xpinstall/wizard/windows/uninstall/parser.c:302 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8597)xpinstall/wizard/windows/uninstall/parser.c:333 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8598)xpinstall/wizard/windows/uninstall/parser.c:343 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8599)xpinstall/wizard/windows/uninstall/parser.c:439 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8600)xpinstall/wizard/windows/uninstall/parser.c:445 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8601)xpinstall/wizard/windows/uninstall/parser.c:509 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8602)xpinstall/wizard/windows/uninstall/parser.c:651 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8603)xpinstall/wizard/windows/uninstall/parser.c:652 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8604)xpinstall/wizard/windows/uninstall/parser.c:653 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8605)xpinstall/wizard/windows/uninstall/parser.c:658 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8606)xpinstall/wizard/windows/uninstall/parser.c:659 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8607)xpinstall/wizard/windows/uninstall/parser.c:664 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8608)xpinstall/wizard/windows/uninstall/parser.c:683 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8609)xpinstall/wizard/windows/uninstall/parser.c:694 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8610)xpinstall/wizard/windows/uninstall/parser.c:94 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8611)xpinstall/wizard/windows/uninstall/parser.c:199 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8612)xpinstall/wizard/windows/uninstall/parser.c:666 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8613)xpinstall/wizard/windows/uninstall/parser.c:696 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8614)xpinstall/wizard/windows/uninstall/parser.c:698 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8615)xpinstall/wizard/windows/uninstall/parser.c:703 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8616)xpinstall/wizard/windows/uninstall/rdi.c:408 High: LoadLibraryEx: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8617)xpinstall/wizard/windows/uninstall/rdi.c:38 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8618)xpinstall/wizard/windows/uninstall/rdi.c:114 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8619)xpinstall/wizard/windows/uninstall/rdi.c:118 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8620)xpinstall/wizard/windows/uninstall/rdi.c:222 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8621)xpinstall/wizard/windows/uninstall/rdi.c:241 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8622)xpinstall/wizard/windows/uninstall/rdi.c:242 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8623)xpinstall/wizard/windows/uninstall/rdi.c:243 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8624)xpinstall/wizard/windows/uninstall/rdi.c:303 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8625)xpinstall/wizard/windows/uninstall/rdi.c:337 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8626)xpinstall/wizard/windows/uninstall/rdi.c:355 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8627)xpinstall/wizard/windows/uninstall/rdi.c:377 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8628)xpinstall/wizard/windows/uninstall/rdi.c:405 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8629)xpinstall/wizard/windows/uninstall/rdi.c:448 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8630)xpinstall/wizard/windows/uninstall/rdi.c:449 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8631)xpinstall/wizard/windows/uninstall/rdi.c:450 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8632)xpinstall/wizard/windows/uninstall/rdi.c:525 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8633)xpinstall/wizard/windows/uninstall/rdi.c:558 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8634)xpinstall/wizard/windows/uninstall/rdi.c:559 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8635)xpinstall/wizard/windows/uninstall/rdi.c:135 High: LoadLibrary: LoadLibrary will search several places for a library if no path is specified, allowing trojan DLL's to be inserted elsewhere even if the intended DLL is correctly protected from overwriting. Make sure to specify the full path.
r8636)xpinstall/wizard/windows/uninstall/rdi.c:185 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8637)xpinstall/wizard/windows/uninstall/rdi.c:225 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8638)xpinstall/wizard/windows/uninstall/rdi.c:383 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8639)xpinstall/wizard/windows/uninstall/rdi.c:498 High: lstrcpy: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8640)xpinstall/wizard/windows/uninstall/uninstall.c:385 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8641)xpinstall/wizard/windows/uninstall/uninstall.c:423 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8642)xpinstall/wizard/windows/uninstall/uninstall.c:500 High: lstrcat: Check to be sure that argument 2 passed to this function call will not copy more data than can be handled, resulting in a buffer overflow.
r8643)xpinstall/wizard/windows/uninstall/uninstall.c:72 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8644)xpinstall/wizard/windows/uninstall/uninstall.c:83 High: fixed size local buffer: Extra care should be taken to ensure that character arrays that are allocated on the stack are used safely. They are prime targets for buffer overflow attacks.
r8645)xpinstall/wizard/windows/uninstall/uninstall.c:87 High: wsprintf: Check to be sure that the non-constant format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle.
r8646)xpinstall/wizard/windows/uninstall/uninstall.h:87 High: wsprintf: Check to be sure that the format string passed as argument 2 to this function call does not come from an untrusted source that could have added formatting characters that the code is not prepared to handle. Additionally, the format string could contain `%s' without precision that could result in a buffer overflow.