Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MouseInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/WorldViewInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameConfig.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Heartbeat.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/KeyboardInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Heartbeat.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BaseGameManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BaseGameManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BotGameManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConfigVariable.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapsManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/TileInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/WorldViewInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapsManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BotGameManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PathScheduler.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerCommand.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/TileInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameConfig.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MouseInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConfigVariable.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PathScheduler.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/KeyboardInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Structs/TileSetStruct.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ShellWeapon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/MissleWeapon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ShellWeapon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/WeaponGlobals.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Weapon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Projectile.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/MissleWeapon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/WeaponGlobals.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Projectile.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ProjectileInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Weapon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/BulletWeapon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ProjectileInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/BulletWeapon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/GameViewGlobals.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SpecialButtonView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OrderingView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MainMenuView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/CreditsView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/RMouseHackView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SpecialButtonView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OrderingView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/IPAddressView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/ServerListView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/JoinView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/TipsView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/JoinView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/PlayerNameView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/TipsView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/GetSessionView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerQueryThread.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerList.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerInfo.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerList.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerInfo.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerQueryThread.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/GetSessionView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/PlayerNameView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/ServerListView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/IPAddressView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MainMenuView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SkirmishView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/HelpView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/HelpView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/CreditsView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SkirmishView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/RMouseHackView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/GameViewGlobals.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollViewAlt.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameTemplateView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LoadingView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/DisconectedView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/ResignView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/DisconectedView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GFlagSelectionView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LoadingView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GFlagSelectionView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/ResignView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureExitView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureResignView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/MiniMapView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameTemplateView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureResignView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/MiniMapView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureExitView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollViewAlt.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ViewGlobals.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Component.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ScrollBar.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/MiniMap.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/MiniMap.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Button.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Label.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cButton.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Choice.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ScrollBar.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/newButton.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/CheckBox.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/MouseEvent.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/CheckBox.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InputEvent.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Button.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/newButton.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Choice.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Label.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cButton.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Component.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/StateChangedCallback.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ViewGlobals.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Resources/ResourceManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Resources/ResourceManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathingState.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathingState.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TipOfDay.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Sprite.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WadMapTable.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ViewCamera.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldMap.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/UnitMessageTypes.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ViewCamera.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TipOfDay.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpawnList.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldMap.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/UnitNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientMessageRouter.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkServer.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/TerminalNetMesg.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerConnectDaemon.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacket.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketDebugger.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageEncoder.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientMessageRouter.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageEncoder.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/SystemNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerMessageRouter.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/GameControlNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerMessageRouter.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ObjectiveNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkServer.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkClient.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/PlayerNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkState.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageDecoder.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerConnectDaemon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageDecoder.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkReturnCodes.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkState.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketDebugger.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetTypes.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkClient.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/PowerUpNetMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpawnList.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/UnitMessage.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ScreenSurface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionList.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionBoxSprite.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerUnitConfig.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ScreenSurface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerUnitConfig.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlacementMatrix.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpriteSorter.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Sprite.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlacementMatrix.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/OpcodeDebugger.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/OpcodeDebugger.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionList.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpriteSorter.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionBoxSprite.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUp.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/EnemyRadarPowerUp.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/BonusUnitPowerUp.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUpInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUpInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/UnitPowerUp.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/UnitPowerUp.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/BonusUnitPowerUp.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUp.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/EnemyRadarPowerUp.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/Objective.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/ObjectiveInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/Objective.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/ObjectiveInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/NetworkGlobals.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/CoreTypes.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/NetworkGlobals.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/main.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/NetPanzerModule.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptManager.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptHelper.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptManager.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptHelper.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/Sound.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLEvents.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/DummySound.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/Sound.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLEvents.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLVideo.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLVideo.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLSound.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/DummySound.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLSound.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitLifecycles.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitProfileInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodes.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitState.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitGlobals.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBase.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeEncoder.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitState.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBucketArray.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitGlobals.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/Vehicle.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBlackBoard.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeDecoder.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitProfileInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeEncoder.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/Vehicle.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBucketArray.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBlackBoard.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeDecoder.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitTypes.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CloudParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleTweakView.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Particle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateExplosionSystem.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TrajectoryParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/RadarPingParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlameParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateExplosionSystem.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TrajectoryParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystem2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlashParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Physics.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/MovementDirtPuffParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/WindParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlameParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CloudParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CraterParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmokingTrajectoryParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Physics.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystemGlobals.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/PuffParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/DirtKickParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/PuffParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/VectorPuffParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SparkParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CraterParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/VectorPuffParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticleSystem2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateMuzzleSystem.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/RadarPingParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Particle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticleSystem2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmolderParticleSystem2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleTweakView.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmolderParticleSystem2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateMuzzleSystem.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystem2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticleSystem2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SparkParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticleSystem2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmokingTrajectoryParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticleSystem2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/DirtKickParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticleSystem2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystemGlobals.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlashParticle2D.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/WindParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticle2D.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotPlayer.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotTaskList.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/Bot.cpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotTask.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotTaskList.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/Bot.hpp
Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotPlayer.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StreamTokenizer.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Timer.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/NTimer.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/FileStream.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/UtilInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/BresenhamLine.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StringUtil.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimeStamp.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/UtilInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Math.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Timer.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StringUtil.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Endian.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Math.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimeStamp.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StringTokenizer.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimerInterface.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/NoCopy.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/BresenhamLine.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimerInterface.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Log.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/option.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/option.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/command_line.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/command_line.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iXY.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iXY.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fXYZ.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fRect.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iRect.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fXYZ.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fRect.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/Angle.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/Angle.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iRect.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fXY.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Section.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Store.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Section.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Store.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPListenSocket.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPSocket.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/Address.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkException.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketManager.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/Address.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketBase.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPListenSocket.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/UDPSocket.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPSocket.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketSet.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketBase.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketHeaders.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/UDPSocket.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketManager.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BitArray.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/LinkListDoubleTemplate.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BoundBox.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BucketArrayTemplate.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BitArray.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/ArrayTemplate.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/QueueTemplate.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BoundBox.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/RGBColor.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Color.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Color.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/DigitText.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/BuiltinFont.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/FontSystem2D.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Span.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/RGBColor.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Span.hpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/DigitText.cpp
Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp
Examining data/netpanzer-0.8.7+ds/support/tools/bmp2pak.cpp
Examining data/netpanzer-0.8.7+ds/support/tools/pak2bmp.cpp
Examining data/netpanzer-0.8.7+ds/support/macosx/SDLMain.h

FINAL RESULTS:

data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:253:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/2080.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:256:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/4060.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:259:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/6040.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:262:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/8020.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:272:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/Brighten.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:276:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/DarkenALot.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:278:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/DarkenALittle.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:281:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s/LightDark.tbl", tablePath);
data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp:31:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(message, 255, msg, args);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:42:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(writedir, "%s.%s", userdir, application);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:46:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(mkdir, ".%s", application);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:82:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(str, "%s%s%s", d, dirsep, *i);
data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:155:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf(buf+timelen, sizeof(buf)-timelen-1, fmt, ap);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:427:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf( str_buf, "MAP %s NOT FOUND!", game_setup->map_name );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:122:5:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    vsnprintf( temp_str, 256, format, vap );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:163:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( line_list[ line_index ].str, temp_str_ptr );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:272:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( inputPrompt, prompt );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:277:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( str, inputString );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:369:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(inputString, CommandList[commandPos].c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:79:32:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        __attribute__(( format(printf, 4, 5) ));
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:217:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(chat_string_warning_k, "Server kicked '%s' due to noobiness!",player->getName().c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:247:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                    sprintf(chat_string_warning, "Warning '%s' - players with %i points or less get kicked!", player->getName().c_str(), GameConfig::game_lowscorelimit);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:558:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf( str_buf, "MAP %s NOT FOUND!", map_name );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:39:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( map_path, file_path );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:41:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( path, file_path );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:46:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat( tile_set_path, main_map.getAssocTileSet() );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:91:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy( path, map_path );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:501:29:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                            sprintf(chat_string, "Server kicked '%s' due to inactivity",player->getName().c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/ObjectiveInterface.cpp:170:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(objective_obj->name, name.c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:178:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%sgroundChunks.pak", chunkPathPAK);
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:241:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%sgrayUnitChunks.pak", chunkPathPAK);
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:287:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%sgreenUnitChunks.pak", chunkPathPAK);
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:341:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%sburnGroundChunks.pak", chunkPathPAK);
data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptManager.cpp:55:11:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          printf(lua_toboolean(L, i) ? "true" : "false");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.cpp:52:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buf, sizeof(buf),
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.cpp:163:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "%s%s", title, subTitle);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:47:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(cInputFieldString::string, string);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:91:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(excludedCharacters, other.excludedCharacters);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:115:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(excludedCharacters, other.excludedCharacters);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:194:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(excludedCharacters, exChars);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.cpp:177:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(statBuf, sizeof(statBuf),
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:308:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "Wind:   %s (%d pix/sec)",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:314:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "Clouds: %s (%d allocated)",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.cpp:175:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(statBuf, sizeof(statBuf),
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:395:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strBuf, "%s", getUnitName(vsvSelectedUnit));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:554:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpostUserNameBuf, "Owner:  %s...", strBuf);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:558:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(outpostUserNameBuf, "Owner:  %s", obj->occupying_player->getName().c_str() );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:571:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(outpostNameBuf, "Outpost:  %s...",  strBuf);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:575:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(outpostNameBuf, "Outpost:  %s", (const char *) obj->name );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:595:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(productionUnitBuf, "Production: %s", getUnitName(obj->unit_generation_type));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.cpp:311:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(currentView, "%s", searchName);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/GetSessionView.cpp:168:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(currentMultiView, "%s", searchName);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.cpp:115:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(currentMultiView, "%s", searchName);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:266:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(strBuf, "Name:       %s", mapList[curMap]->name.c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Core/main.cpp:230:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(time(0));
data/netpanzer-0.8.7+ds/src/Lib/2D/BuiltinFont.cpp:21:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char staticFont[8192]= {
data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:174:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(span + 1, &rowPtr[spanX1], spanLen * sizeof(PIX));
data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:368:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(destRowPtr + x1, data, (srcMax.x-x1) * sizeof(PIX));
data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:373:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(destRowPtr + x1, data, (x2-x1) * sizeof(PIX));
data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:400:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(destRowPtr + ltoh16(span->x1), span + 1,
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tablePath[512];
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:250:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[512];
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char staticFont[8192];
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:433:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dPtr, sPtr, pixelsPerRow * numRows * sizeof(PIX));
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:436:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dPtr, sPtr, pixelsPerRow * sizeof(PIX));
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:880:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dPtr, sPtr, getWidth() * sizeof(PIX));
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1301:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dptr,fptr,FONT_WIDTH);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1600:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char strBuf[256];
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.hpp:246:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dest, mem, std::min(frame_len, dest_len));
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.hpp:252:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(mem, src, std::min(frame_len, src_len));
data/netpanzer-0.8.7+ds/src/Lib/Network/Address.cpp:152:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&result.ss, firstaddress->ai_addr, firstaddress->ai_addrlen);
data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp:78:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&thread_work.ss, firstaddress->ai_addr, firstaddress->ai_addrlen);
data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp:209:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(&address.ss, &(*i).ss, (*i).ss_len);
data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp:232:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&address.ss, firstaddress->ai_addr, firstaddress->ai_addrlen);
data/netpanzer-0.8.7+ds/src/Lib/Network/TCPSocket.cpp:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4096];
data/netpanzer-0.8.7+ds/src/Lib/Network/UDPSocket.cpp:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[4096];
data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp:41:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(message, other.message, len+1);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileStream.hpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileStream.hpp:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:172:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char fn[fn_length];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:173:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fn, filename, fn_length); // includes \0;
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:197:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(fn_start, *curfile, fn_length-(folder_sep-fn));
data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2048];
data/netpanzer-0.8.7+ds/src/Lib/Util/UtilInterface.cpp:38:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        port[0]=atoi(port_str.c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:147:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    assert(open.size() == 0);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:148:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    open.push(best_node);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:273:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (!open.empty()) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:274:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            best_node = open.top();
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:275:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            open.pop();
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:313:33:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                open.push(node);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.hpp:115:46:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        AstarNodePtrCompare> open;
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.hpp:139:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( PathList::list, rhs.list, sizeof( unsigned long ) * rhs.size );
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.hpp:143:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy( PathList::list, rhs.list, sizeof( unsigned long ) * rhs.size );
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:32:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char netp_id_header[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[1024];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tile_set[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp:40:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char player_set[32];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message_text[150];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message_text[150];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:109:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( buf, "Protocol Version: %u",
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:239:24:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                       memcpy(&upf.player_flag, cnupf, 280);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:419:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:453:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:459:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( str_buf, "Loading Game Data ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:467:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( str_buf, "Loading Game Data ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientMessageRouter.cpp:137:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pp.data, mmessage, msg_len);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pw[sizeof(this->password)];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp:56:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pw, this->password, sizeof(this->password));
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char password[32];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char player_name[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     map_name[32];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/GameControlNetMessage.hpp:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char map_name[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageDecoder.cpp:43:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&decode_message, message, size);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageEncoder.cpp:54:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(mlen+1, message, size);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.hpp:32:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&array[index], object, sizeof(NetPacket));
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.hpp:39:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(object, &array[ front ], sizeof(NetPacket));
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkClient.cpp:115:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char text[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkInterface.cpp:36:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(TEMP_PACKET.data, data, size);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerMessageRouter.cpp:132:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(packet.data, mmessage, msg_len);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/SystemNetMessage.hpp:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char view_name[32];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:348:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp, state->name, 64);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.hpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerUnitConfig.cpp:49:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        num_units = n < (int)str_counts.size() ? atoi(str_counts[n].c_str()) : 0;
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.cpp:540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chat_string[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.cpp:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char chat_string[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message_text[MAX_CHAT_MSG_LEN];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.cpp:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message_text[MAX_CHAT_MSG_LEN];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp:111:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char timestamp[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp:128:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp:173:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char timestamp[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_str[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:348:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(inputString + cursorPos, inputString + cursorPos + 1, strlen(inputString + cursorPos + 1) + 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:358:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(inputString + cursorPos - 1, inputString + cursorPos, byteCount);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    str[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:63:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char inputString[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:64:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char inputPrompt[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:216:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char chat_string_warning_k[140];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:246:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    char chat_string_warning[140];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:114:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:137:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:142:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:147:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:184:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:207:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:212:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:217:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:329:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:335:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:555:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str_buf[128];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.hpp:38:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char map_cycle_fsm_client_map_name[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.cpp:98:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                unsigned int flagnum = atoi(flagstr.c_str());
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.cpp:166:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char flagdata[(sizeof(rawflag)*2) + 1];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/KeyboardInterface.hpp:47:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(previous_key_state, key_table, sizeof(key_table));
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:37:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tile_set_path[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:42:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat( path, ".npm" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:45:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy( tile_set_path, "wads/" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:93:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat( path, ".spn" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.hpp:49:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char map_path[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:357:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strbuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:362:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( strbuf, "Loading Game Data ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:397:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( strbuf, "Loading Game Data ... (%d%%)", percent_complete);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:500:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char chat_string[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.cpp:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_str[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.cpp:198:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( temp_str, "Player %u", player_id );
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp:127:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp:148:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buf+1, data, size);
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp:195:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tempbuffer+tempoffset, data+dataptr, tocopy);
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp:390:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tempbuffer+tempoffset, data+dataptr, tocopy);
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.hpp:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sendbuffer[SEND_BUFFER_LEN];
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.hpp:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempbuffer[_MAX_NET_PACKET_SIZE];
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:29:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char base64_chars[65]="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:31:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char auth_ptr_dest[5];
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:93:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
                if(atoi(b)!=200) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/Objective.hpp:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          name[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:177:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:240:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:286:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:340:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Particle2D.cpp:44:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char particleArray[MAX_PARTICLES][MAX_PARTICLE_CLASS_SIZE];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp:525:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "particleSystemCount: %d", ParticleSystem2D::getParticleSystemCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp:529:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "particleCount:       %d", Particle2D::getFrameCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  pyro_id_header[64];   // file text identification;
data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  map_name[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  tile_dbase_name[64];  // tile_dbase to use with map
data/netpanzer-0.8.7+ds/src/NetPanzer/Resources/ResourceManager.cpp:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char flagUsedCount[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Structs/TileSetStruct.hpp:34:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char	netp_id_header[64];
data/netpanzer-0.8.7+ds/src/NetPanzer/Structs/TileSetStruct.hpp:39:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char	palette[768];
data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLVideo.cpp:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeDecoder.cpp:48:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&opcode_message, message, size);
data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeEncoder.cpp:50:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(opcode_message.data + opcode_index, opcode, opcode->getSize());
data/netpanzer-0.8.7+ds/src/NetPanzer/Units/Vehicle.cpp:1924:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&pending_AI_comm_mesg, command_mesg, sizeof(UMesgAICommand));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp:635:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp:641:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(strBuf, "STATUS_VISIBLE");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp:644:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(strBuf, "INVISIBLE");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.cpp:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:285:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(destString + cursorPos, destString + cursorPos + 1, strlen(destString + cursorPos + 1) + 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:295:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(destString + cursorPos - 1, destString + cursorPos, byteCount);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:139:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Packets" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:145:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Sent %ld, %.4f 1/s, %.4f Avg",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:154:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Recv %ld, %.4f 1/s, %.4f Avg",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:162:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Bytes" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:167:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Sent %ld, %.4f 1/s, %.4f Avg",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:175:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Recv %ld, %.4f 1/s, %.4f Avg",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:183:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Opcodes" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:188:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Sent : %ld, %.4f 1/s ",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:195:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Recv : %ld, %.4f 1/s",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:203:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "Ping Time: %.4f (ms)", NetworkState::ping_time );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:205:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "Ping Time: NA" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:220:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Sorter" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:226:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "Level %lu : %lu  ", i, SPRITE_SORTER.getMaxSprites( i ) );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:237:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:241:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Pathing" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:246:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "A* Time: %.6f s", PathingState::astar_gen_time );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:251:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "A* Avg: %.6f s", PathingState::getAverageAstarPathTime() );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:256:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "A* Total: %.6f s", PathingState::astar_gen_time_total );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:262:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Path Length: %ld ", PathingState::path_length );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:268:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Paths: %lu ", PathingState::path_gen_count );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:273:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Updates: %lu ", PathingState::update_gen_count );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:278:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Cache Hits: %lu ", PathingState::path_cache_hits );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:283:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Cache Misses: %lu ", PathingState::path_cache_misses );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:298:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Units" );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:311:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "Player %d : %lu  ", i, units);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:316:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "UnitTotal : %d", total );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/DisconectedView.cpp:40:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(MenuTemplateView::currentMultiView, "GetSessionView");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.cpp:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char statBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GFlagSelectionView.cpp:67:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(upf.player_flag,
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameView.cpp:209:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(destptr,tileptr,columns);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:169:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Alive Count: %d", Surface::getTotalSurfaceCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:173:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Mem: %d b, %d k, %3.2f MG", Surface::getTotalByteCount(), Surface::getTotalByteCount() / 1024, float(Surface::getTotalByteCount()) / 1024.0f / 1024.0f);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:180:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Alive Count: %d", PackedSurface::getTotalSurfaceCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:184:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Draw Count:  %d", PackedSurface::totalDrawCount);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:188:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Mem: %d b, %d k, %3.2f MG", PackedSurface::getTotalByteCount(), PackedSurface::getTotalByteCount() / 1024, float(PackedSurface::getTotalByteCount()) / 1024.0f / 1024.0f);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:195:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Count:     %d", ColorTable::getTotalColorArrayCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:199:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Mem: %d b, %d k, %3.2f MG", ColorTable::getTotalByteCount(), ColorTable::getTotalByteCount() / 1024, float(ColorTable::getTotalByteCount()) / 1024.0f / 1024.0f);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:218:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Particle Systems: %d", ParticleSystem2D::getParticleSystemCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:222:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Particles:        %d", Particle2D::getFrameCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:229:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Particle Systems: %d", ParticleSystem2D::getPeakParticleSystemCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:233:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Particles:        %d", Particle2D::getPeakCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:246:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Cache Miss:                %d (%%%2.2f)", int(missCount), 100.0f * (missCount / (hitCount + missCount)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:250:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Cache Hit:                 %d (%%%2.2f)", int(hitCount), 100.0f * (hitCount / (hitCount + missCount)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:260:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Explosion Flame Flash Miss:%d (%%%2.2f)", int(missCount), 100.0f * (missCount / (hitCount + missCount)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:264:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Explosion Flame Flash Hit: %d (%%%2.2f)", int(hitCount), 100.0f * (hitCount / (hitCount + missCount)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:271:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Muzzle System Miss:        %d (%%%2.2f)", int(missCount), 100.0f * (missCount / (hitCount + missCount)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:275:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Muzzle System Hit:         %d (%%%2.2f)", int(hitCount), 100.0f * (hitCount / (hitCount + missCount)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.cpp:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char statBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:310:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:399:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "%01d:%02d/%01d:%02d",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:408:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "power off");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:412:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "power off");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:418:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d/%d", int(UnitInterface::getUnitCount(PlayerInterface::getLocalPlayerIndex())), unitPerPlayer);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:500:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:517:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outpostNameBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outpostUserNameBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:520:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char productionUnitBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:521:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timeLeftBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:599:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(timeLeftBuf, "Time Left:  %01d:%02d",
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.hpp:61:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char currentMultiView[256];  // Used to keep track of where you are in the multiplayer menus.
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.hpp:62:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char currentView[256];       // Used to keep track of which menu you are currently in.
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.hpp:40:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char gameTypeBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:439:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:452:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d", getCurMaxPlayersCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:460:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d - %d max per player", getCurMaxUnitCount(), getCurMaxUnitCount() / getCurMaxPlayersCount());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:495:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "%d%% - %d of %d", getObjectiveCapturePercent(),
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:499:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(strBuf, "Map Data Needed");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:507:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d:%d", getTimeLimitHours(), getTimeLimitMinutes() );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:514:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d Frags", getFragLimit() );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostView.cpp:36:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(HostView::gameTypeBuf, "Objective");
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:272:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Size:       %d x %d", sizeX, sizeY);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:276:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "Objectives: %d", mapList[curMap]->objectiveCount);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/ServerListView.cpp:166:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char ssn[44];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.cpp:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.cpp:136:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%1.3f of %1.3f", grayPercent, maxPercent);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.cpp:56:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d", scrollBar->getValue());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char res_str[20];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:321:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char strBuf[256];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:329:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d %%", int((float(getScrollRate()) / 10000.0f * 100.0f)));
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:338:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d %%", getSoundVolume());
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:346:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(strBuf, "%d %%", getMusicVolume());
data/netpanzer-0.8.7+ds/support/tools/bmp2pak.cpp:110:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *f = fopen(filesystem::getRealWriteName(filename.c_str()).c_str(), "r");
data/netpanzer-0.8.7+ds/support/tools/pak2bmp.cpp:132:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *f = fopen(filesystem::getRealWriteName(deffile.str().c_str()).c_str(), "w");
data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.cpp:292:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    file->read(&checkcolor, sizeof(Uint8), 3);
data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.cpp:296:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	file->read(colorArray, colorCount, 1);
data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:239:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	file->read(packedDataChunk, rowOffsetTable[pix.y*frameCount], 1);
data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:299:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    file->read(&color[i], 3, 1);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1316:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return ascii8x8.getWidth() * strlen(text);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1336:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(str);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1419:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bltString(  (getWidth() - (strlen(string) * ascii8x8.getWidth())) / 2,
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1427:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bltString(  (getWidth() - (strlen(string) * ascii8x8.getWidth())) / 2,
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1440:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bltStringShadowed((getWidth() - (strlen(string) * ascii8x8.getWidth())) / 2,
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1452:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int length = strlen(string);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1526:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            file->read(mem, getWidth() * getHeight(), 1);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1536:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                file->read(mem, getWidth(), 1);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1537:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                file->read(buffer, padding, 1);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1583:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int  totalLength = strlen(string);
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1617:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((int) (pos.x + strlen(strBuf) * ascii8x8.getWidth()) > rect.max.x) {
data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1628:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pos.x += strlen(strBuf) * ascii8x8.getWidth();
data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp:39:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(other.message);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:40:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* writedir = new char[strlen(userdir) + strlen(application) + 2];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:40:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* writedir = new char[strlen(userdir) + strlen(application) + 2];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:45:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char* mkdir = new char[strlen(application)+2];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:71:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t extlen = strlen(archiveExt);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:75:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t l = strlen(*i);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:81:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    char* str = new char[strlen(d) + strlen(dirsep) + l + 1];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:81:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    char* str = new char[strlen(d) + strlen(dirsep) + l + 1];
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:171:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int fn_length = strlen(filename)+1;
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:319:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
void ReadFile::read(void* buffer, size_t objsize, size_t objcount)
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:347:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	file->read(ptr, size, maxnum);
data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.hpp:62:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    void read(void* buffer, size_t objsize, size_t objcount);
data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:156:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(buf, "\n");
data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:164:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	    int blen = strlen(buf);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:26:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&netp_id_header, sizeof(netp_id_header), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:28:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&name, sizeof(name), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:29:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&description, sizeof(description), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:32:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&tile_set, sizeof(tile_set), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp:99:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ConnectClientSettings::player_name, player_name, 64);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:319:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(state.name, name.c_str(), sizeof(state.name)-1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:335:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(state.name, name.c_str(), sizeof(state.name)-1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:47:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&dbHeader->netp_id_header, sizeof(dbHeader->netp_id_header), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:52:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    file.read(&dbHeader->palette, sizeof(dbHeader->palette), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:103:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	file->read(tile_info, tile_set_info.tile_count, sizeof(TILE_HEADER));
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:104:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	file->read( tile_data, tile_buffer_size, 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:147:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		file->read( (tile_info + mapped_index), sizeof(TILE_HEADER), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:184:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		    file->read( (tile_data + (mapped_index*tile_size)),
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:229:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		file->read((tile_info + mapped_index), sizeof ( TILE_HEADER ), 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:274:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            partition_load_fhandle->read((tile_info + mapped_index), sizeof ( TILE_HEADER ), 1 );
data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:311:37:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            partition_load_fhandle->read((tile_data + (partition_load_mapped_index*tile_size)), tile_size, 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:132:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp_str_length = (long) strlen(temp_str);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:144:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy( line_list[ line_index ].str, temp_str_ptr, max_char_per_line);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:241:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        input_offset.x = current_line.x + ( (long) strlen( inputPrompt ) ) * CHAR_XPIX;
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:245:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        input_string_length = strlen(inputString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:284:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int length = strlen(inputString) + 1;
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:320:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int length = strlen(inputString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:332:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cursorPos = strlen(inputString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:344:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (cursorPos == (int) strlen(inputString + cursorPos)) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:348:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            memcpy(inputString + cursorPos, inputString + cursorPos + 1, strlen(inputString + cursorPos + 1) + 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:354:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int byteCount = strlen(inputString + cursorPos);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:372:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cursorPos = strlen(inputString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp:74:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            for(size_t a = 0; a < 12-strlen(commands[i].name); ++a)
data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp:132:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buf[strlen(buf)-1] = '\0';
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:46:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(string) > 0 && strlen(string) < (size_t) maxCharCount) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:46:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(string) > 0 && strlen(string) < (size_t) maxCharCount) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:59:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(this->string, string.c_str(), maxCharCount);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:90:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        excludedCharacters = new char[strlen(other.excludedCharacters)+1];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:114:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        excludedCharacters = new char[strlen(other.excludedCharacters) +1];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:189:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    excludedCharacters = new char [strlen(exChars) + 1];
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:256:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t length = strlen(destString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:267:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cursorPos = strlen(destString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:281:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (cursorPos == strlen(destString)) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:285:72:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            memcpy(destString + cursorPos, destString + cursorPos + 1, strlen(destString + cursorPos + 1) + 1);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:291:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int byteCount = strlen(destString + cursorPos);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:369:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (cursorPos > strlen(destString)) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:370:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cursorPos = strlen(destString);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:212:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    productionUnitPos.x = (strlen("Current Unit:") + 1) * CHAR_XPIX + 2;
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:218:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    timeRequiredPos.x = (strlen("Time:        ") + 1) * CHAR_XPIX + 2;
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:224:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    unitsBuiltPos.x = (strlen("Time:        ") + 1) * CHAR_XPIX + 2;
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:549:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int length = strlen( obj->occupying_player->getName().c_str() );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:552:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(strBuf, obj->occupying_player->getName().c_str() , 10);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:566:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int length = strlen( obj->name );
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:569:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(strBuf, (const char *) obj->name , 7);
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.cpp:60:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(HostJoinTemplateView::gameTypeBuf) == 0) {
data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:220:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	    file->read(mapinfo->thumbnail.getFrame0(), numBytes, 1);

ANALYSIS SUMMARY:

Hits = 381
Lines analyzed = 70098 in approximately 1.58 seconds (44365 lines/second)
Physical Source Lines of Code (SLOC) = 45221
Hits@level = [0]  69 [1]  81 [2] 245 [3]   1 [4]  54 [5]   0
Hits@level+ = [0+] 450 [1+] 381 [2+] 300 [3+]  55 [4+]  54 [5+]   0
Hits/KSLOC@level+ = [0+] 9.95113 [1+] 8.42529 [2+] 6.63409 [3+] 1.21625 [4+] 1.19414 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.