Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/ufoai-2.5/config.h
Examining data/ufoai-2.5/src/client/battlescape/cl_actor.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_actor.h
Examining data/ufoai-2.5/src/client/battlescape/cl_battlescape.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_battlescape.h
Examining data/ufoai-2.5/src/client/battlescape/cl_camera.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_camera.h
Examining data/ufoai-2.5/src/client/battlescape/cl_hud_callbacks.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_hud_callbacks.h
Examining data/ufoai-2.5/src/client/battlescape/cl_hud.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_hud.h
Examining data/ufoai-2.5/src/client/battlescape/cl_localentity.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_localentity.h
Examining data/ufoai-2.5/src/client/battlescape/cl_parse.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_parse.h
Examining data/ufoai-2.5/src/client/battlescape/cl_particle.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_particle.h
Examining data/ufoai-2.5/src/client/battlescape/cl_radar.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_radar.h
Examining data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_spawn.h
Examining data/ufoai-2.5/src/client/battlescape/cl_ugv.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_ugv.h
Examining data/ufoai-2.5/src/client/battlescape/cl_view.cpp
Examining data/ufoai-2.5/src/client/battlescape/cl_view.h
Examining data/ufoai-2.5/src/client/battlescape/events/e_main.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/e_main.h
Examining data/ufoai-2.5/src/client/battlescape/events/e_parse.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/e_parse.h
Examining data/ufoai-2.5/src/client/battlescape/events/e_server.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/e_server.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actoradd.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actoradd.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorappear.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorappear.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorclientaction.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorclientaction.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actordie.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actordie.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorendshot.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorendshot.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actormove.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actormove.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfireaddtarget.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfireaddtarget.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfirechange.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfirechange.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfireremovetarget.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfireremovetarget.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfiretargetupdate.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreactionfiretargetupdate.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreservationchange.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorreservationchange.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorresetclientaction.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorresetclientaction.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorrevitalised.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorrevitalised.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorshoot.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorshoot.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorshoothidden.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorshoothidden.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorstartshoot.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorstartshoot.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorstatechange.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorstatechange.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorstats.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorstats.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorthrow.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorthrow.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorturn.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorturn.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorwound.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorwound.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invadd.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invadd.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invammo.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invammo.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invdel.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invdel.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invreload.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/inventory/e_event_invreload.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_centerview.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_centerview.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_doendround.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_doendround.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_endroundannounce.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_endroundannounce.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_reset.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_reset.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_results.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_results.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_startgame.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/player/e_event_startgame.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_addbrushmodel.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_addbrushmodel.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_addedict.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_addedict.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_cameraappear.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_cameraappear.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_doorclose.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_doorclose.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_dooropen.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_dooropen.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_entappear.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_entappear.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_entdestroy.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_entdestroy.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_entperish.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_entperish.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_explode.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_explode.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_particleappear.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_particleappear.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_particlespawn.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_particlespawn.h
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_sound.cpp
Examining data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_sound.h
Examining data/ufoai-2.5/src/client/cgame/campaign/aliencargo.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/aliencargo.h
Examining data/ufoai-2.5/src/client/cgame/campaign/aliencontainment.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/aliencontainment.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cl_game_campaign.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cl_game_campaign.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_airfight.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_airfight.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_alienbase.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_alienbase.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_alien_interest.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_alien_interest.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_auto_mission.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_auto_mission.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_base.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_base.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_building.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_building.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_capacity.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_capacity.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_cgame_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_cgame_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_employee.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_employee.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_event_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_event_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_event.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_hospital.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_hospital.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_installation.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_installation.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_mapfightequip.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_mapfightequip.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_market.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_market.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_messages.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_mission_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_mission_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_missions.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_missions.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_mission_triggers.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_mission_triggers.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_nation.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_nation.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_overlay.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_overlay.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_parse.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_popup.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_produce.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_produce.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_radar.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_radar.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_rank.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_rank.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_research_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_research_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_research.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_save.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_team.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_team.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_time.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_time.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_transfer.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_transfer.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_ufo.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_ufo.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery.h
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_xvi.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/cp_xvi.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_baseattack.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_baseattack.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_buildbase.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_buildbase.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_harvest.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_harvest.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_intercept.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_intercept.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_recon.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_recon.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_rescue.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_rescue.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_supply.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_supply.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_terror.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_terror.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_ufocarrier.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_ufocarrier.h
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_xvi.cpp
Examining data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_xvi.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_aircraft.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_airfight.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_alienbase.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_aliencont.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_base.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_campaign.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_employee.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_fightequip.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_installation.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_interest.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_market.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_messageoptions.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_messages.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_missions.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_nation.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_produce.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_research.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_statistics.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_transfer.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_triggerevents.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_uforecovery.h
Examining data/ufoai-2.5/src/client/cgame/campaign/save/save_xvi.h
Examining data/ufoai-2.5/src/client/cgame/cgame.h
Examining data/ufoai-2.5/src/client/cgame/cl_game.cpp
Examining data/ufoai-2.5/src/client/cgame/cl_game.h
Examining data/ufoai-2.5/src/client/cgame/cl_game_team.cpp
Examining data/ufoai-2.5/src/client/cgame/cl_game_team.h
Examining data/ufoai-2.5/src/client/cgame/multiplayer/cl_game_multiplayer.cpp
Examining data/ufoai-2.5/src/client/cgame/multiplayer/cl_game_multiplayer.h
Examining data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.cpp
Examining data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.h
Examining data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp
Examining data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.h
Examining data/ufoai-2.5/src/client/cgame/save_character.h
Examining data/ufoai-2.5/src/client/cgame/save_inventory.h
Examining data/ufoai-2.5/src/client/cgame/save_team.h
Examining data/ufoai-2.5/src/client/cgame/skirmish/cl_game_skirmish.cpp
Examining data/ufoai-2.5/src/client/cgame/skirmish/cl_game_skirmish.h
Examining data/ufoai-2.5/src/client/cinematic/cl_cinematic.cpp
Examining data/ufoai-2.5/src/client/cinematic/cl_cinematic.h
Examining data/ufoai-2.5/src/client/cinematic/cl_cinematic_ogm.cpp
Examining data/ufoai-2.5/src/client/cinematic/cl_cinematic_ogm.h
Examining data/ufoai-2.5/src/client/cinematic/cl_cinematic_roq.cpp
Examining data/ufoai-2.5/src/client/cinematic/cl_cinematic_roq.h
Examining data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp
Examining data/ufoai-2.5/src/client/cinematic/cl_sequence.h
Examining data/ufoai-2.5/src/client/cl_console.cpp
Examining data/ufoai-2.5/src/client/cl_console.h
Examining data/ufoai-2.5/src/client/cl_http.cpp
Examining data/ufoai-2.5/src/client/cl_http.h
Examining data/ufoai-2.5/src/client/client.h
Examining data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp
Examining data/ufoai-2.5/src/client/cl_inventory_callbacks.h
Examining data/ufoai-2.5/src/client/cl_inventory.cpp
Examining data/ufoai-2.5/src/client/cl_inventory.h
Examining data/ufoai-2.5/src/client/cl_irc.cpp
Examining data/ufoai-2.5/src/client/cl_irc.h
Examining data/ufoai-2.5/src/client/cl_language.cpp
Examining data/ufoai-2.5/src/client/cl_language.h
Examining data/ufoai-2.5/src/client/cl_main.cpp
Examining data/ufoai-2.5/src/client/cl_menu.cpp
Examining data/ufoai-2.5/src/client/cl_menu.h
Examining data/ufoai-2.5/src/client/cl_renderer.h
Examining data/ufoai-2.5/src/client/cl_screen.cpp
Examining data/ufoai-2.5/src/client/cl_screen.h
Examining data/ufoai-2.5/src/client/cl_shared.h
Examining data/ufoai-2.5/src/client/cl_team.cpp
Examining data/ufoai-2.5/src/client/cl_team.h
Examining data/ufoai-2.5/src/client/cl_tip.cpp
Examining data/ufoai-2.5/src/client/cl_tip.h
Examining data/ufoai-2.5/src/client/cl_tutorials.cpp
Examining data/ufoai-2.5/src/client/cl_tutorials.h
Examining data/ufoai-2.5/src/client/cl_video.cpp
Examining data/ufoai-2.5/src/client/cl_video.h
Examining data/ufoai-2.5/src/client/input/cl_input.cpp
Examining data/ufoai-2.5/src/client/input/cl_input.h
Examining data/ufoai-2.5/src/client/input/cl_joystick.cpp
Examining data/ufoai-2.5/src/client/input/cl_joystick.h
Examining data/ufoai-2.5/src/client/input/cl_keys.cpp
Examining data/ufoai-2.5/src/client/input/cl_keys.h
Examining data/ufoai-2.5/src/client/renderer/r_array.cpp
Examining data/ufoai-2.5/src/client/renderer/r_array.h
Examining data/ufoai-2.5/src/client/renderer/r_bsp.cpp
Examining data/ufoai-2.5/src/client/renderer/r_corona.cpp
Examining data/ufoai-2.5/src/client/renderer/r_corona.h
Examining data/ufoai-2.5/src/client/renderer/r_draw.cpp
Examining data/ufoai-2.5/src/client/renderer/r_draw.h
Examining data/ufoai-2.5/src/client/renderer/r_entity.cpp
Examining data/ufoai-2.5/src/client/renderer/r_entity.h
Examining data/ufoai-2.5/src/client/renderer/r_error.h
Examining data/ufoai-2.5/src/client/renderer/r_flare.cpp
Examining data/ufoai-2.5/src/client/renderer/r_flare.h
Examining data/ufoai-2.5/src/client/renderer/r_font.cpp
Examining data/ufoai-2.5/src/client/renderer/r_font.h
Examining data/ufoai-2.5/src/client/renderer/r_framebuffer.cpp
Examining data/ufoai-2.5/src/client/renderer/r_framebuffer.h
Examining data/ufoai-2.5/src/client/renderer/r_geoscape.cpp
Examining data/ufoai-2.5/src/client/renderer/r_geoscape.h
Examining data/ufoai-2.5/src/client/renderer/r_gl.h
Examining data/ufoai-2.5/src/client/renderer/r_grass.cpp
Examining data/ufoai-2.5/src/client/renderer/r_grass.h
Examining data/ufoai-2.5/src/client/renderer/r_image.cpp
Examining data/ufoai-2.5/src/client/renderer/r_image.h
Examining data/ufoai-2.5/src/client/renderer/r_light.cpp
Examining data/ufoai-2.5/src/client/renderer/r_light.h
Examining data/ufoai-2.5/src/client/renderer/r_lighting.h
Examining data/ufoai-2.5/src/client/renderer/r_lightmap.cpp
Examining data/ufoai-2.5/src/client/renderer/r_lightmap.h
Examining data/ufoai-2.5/src/client/renderer/r_local.h
Examining data/ufoai-2.5/src/client/renderer/r_main.cpp
Examining data/ufoai-2.5/src/client/renderer/r_main.h
Examining data/ufoai-2.5/src/client/renderer/r_material.cpp
Examining data/ufoai-2.5/src/client/renderer/r_material.h
Examining data/ufoai-2.5/src/client/renderer/r_matrix.cpp
Examining data/ufoai-2.5/src/client/renderer/r_matrix.h
Examining data/ufoai-2.5/src/client/renderer/r_mesh_anim.cpp
Examining data/ufoai-2.5/src/client/renderer/r_mesh_anim.h
Examining data/ufoai-2.5/src/client/renderer/r_mesh.cpp
Examining data/ufoai-2.5/src/client/renderer/r_mesh.h
Examining data/ufoai-2.5/src/client/renderer/r_misc.cpp
Examining data/ufoai-2.5/src/client/renderer/r_misc.h
Examining data/ufoai-2.5/src/client/renderer/r_model_alias.cpp
Examining data/ufoai-2.5/src/client/renderer/r_model_alias.h
Examining data/ufoai-2.5/src/client/renderer/r_model_brush.cpp
Examining data/ufoai-2.5/src/client/renderer/r_model_brush.h
Examining data/ufoai-2.5/src/client/renderer/r_model.cpp
Examining data/ufoai-2.5/src/client/renderer/r_model.h
Examining data/ufoai-2.5/src/client/renderer/r_model_md2.cpp
Examining data/ufoai-2.5/src/client/renderer/r_model_md2.h
Examining data/ufoai-2.5/src/client/renderer/r_model_md3.cpp
Examining data/ufoai-2.5/src/client/renderer/r_model_md3.h
Examining data/ufoai-2.5/src/client/renderer/r_model_obj.cpp
Examining data/ufoai-2.5/src/client/renderer/r_model_obj.h
Examining data/ufoai-2.5/src/client/renderer/r_particle.cpp
Examining data/ufoai-2.5/src/client/renderer/r_particle.h
Examining data/ufoai-2.5/src/client/renderer/r_program.cpp
Examining data/ufoai-2.5/src/client/renderer/r_program.h
Examining data/ufoai-2.5/src/client/renderer/r_sdl.cpp
Examining data/ufoai-2.5/src/client/renderer/r_sdl.h
Examining data/ufoai-2.5/src/client/renderer/r_sphere.cpp
Examining data/ufoai-2.5/src/client/renderer/r_sphere.h
Examining data/ufoai-2.5/src/client/renderer/r_state.cpp
Examining data/ufoai-2.5/src/client/renderer/r_state.h
Examining data/ufoai-2.5/src/client/renderer/r_surface.cpp
Examining data/ufoai-2.5/src/client/renderer/r_thread.cpp
Examining data/ufoai-2.5/src/client/renderer/r_thread.h
Examining data/ufoai-2.5/src/client/sound/s_local.h
Examining data/ufoai-2.5/src/client/sound/s_main.cpp
Examining data/ufoai-2.5/src/client/sound/s_main.h
Examining data/ufoai-2.5/src/client/sound/s_mix.cpp
Examining data/ufoai-2.5/src/client/sound/s_mix.h
Examining data/ufoai-2.5/src/client/sound/s_mumble.cpp
Examining data/ufoai-2.5/src/client/sound/s_mumble.h
Examining data/ufoai-2.5/src/client/sound/s_music.cpp
Examining data/ufoai-2.5/src/client/sound/s_music.h
Examining data/ufoai-2.5/src/client/sound/s_sample.cpp
Examining data/ufoai-2.5/src/client/sound/s_sample.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractnode.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractnode.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractoption.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractoption.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractscrollable.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractscrollable.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractscrollbar.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractscrollbar.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractvalue.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_abstractvalue.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_bar.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_bar.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_base.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_base.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_baseinventory.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_baseinventory.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_battlescape.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_battlescape.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_button.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_button.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_checkbox.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_checkbox.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_container.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_container.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_controls.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_controls.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_data.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_data.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_editor.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_editor.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_ekg.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_ekg.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_geoscape.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_geoscape.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_image.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_image.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_item.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_item.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_linechart.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_linechart.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_messagelist.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_messagelist.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_model.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_model.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_option.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_option.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_optionlist.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_optionlist.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_optiontree.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_optiontree.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_panel.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_panel.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_radar.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_radar.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_radiobutton.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_radiobutton.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_rows.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_rows.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_selectbox.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_selectbox.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_sequence.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_sequence.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_special.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_special.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_spinner.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_spinner.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_string.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_string.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_tab.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_tab.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_tbar.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_tbar.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_text2.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_text2.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_text.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_textentry.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_text.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_textlist.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_textlist.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_texture.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_texture.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_timer.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_timer.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_todo.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_todo.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_video.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_video.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_vscrollbar.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_vscrollbar.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_window.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_window.h
Examining data/ufoai-2.5/src/client/ui/node/ui_node_zone.cpp
Examining data/ufoai-2.5/src/client/ui/node/ui_node_zone.h
Examining data/ufoai-2.5/src/client/ui/ui_actions.cpp
Examining data/ufoai-2.5/src/client/ui/ui_actions.h
Examining data/ufoai-2.5/src/client/ui/ui_behaviour.cpp
Examining data/ufoai-2.5/src/client/ui/ui_behaviour.h
Examining data/ufoai-2.5/src/client/ui/ui_components.cpp
Examining data/ufoai-2.5/src/client/ui/ui_components.h
Examining data/ufoai-2.5/src/client/ui/ui_data.cpp
Examining data/ufoai-2.5/src/client/ui/ui_data.h
Examining data/ufoai-2.5/src/client/ui/ui_dataids.h
Examining data/ufoai-2.5/src/client/ui/ui_dragndrop.cpp
Examining data/ufoai-2.5/src/client/ui/ui_dragndrop.h
Examining data/ufoai-2.5/src/client/ui/ui_draw.cpp
Examining data/ufoai-2.5/src/client/ui/ui_draw.h
Examining data/ufoai-2.5/src/client/ui/ui_expression.cpp
Examining data/ufoai-2.5/src/client/ui/ui_expression.h
Examining data/ufoai-2.5/src/client/ui/ui_font.cpp
Examining data/ufoai-2.5/src/client/ui/ui_font.h
Examining data/ufoai-2.5/src/client/ui/ui_input.cpp
Examining data/ufoai-2.5/src/client/ui/ui_input.h
Examining data/ufoai-2.5/src/client/ui/ui_internal.h
Examining data/ufoai-2.5/src/client/ui/ui_main.cpp
Examining data/ufoai-2.5/src/client/ui/ui_main.h
Examining data/ufoai-2.5/src/client/ui/ui_node.cpp
Examining data/ufoai-2.5/src/client/ui/ui_node.h
Examining data/ufoai-2.5/src/client/ui/ui_nodes.cpp
Examining data/ufoai-2.5/src/client/ui/ui_nodes.h
Examining data/ufoai-2.5/src/client/ui/ui_parse.cpp
Examining data/ufoai-2.5/src/client/ui/ui_parse.h
Examining data/ufoai-2.5/src/client/ui/ui_popup.cpp
Examining data/ufoai-2.5/src/client/ui/ui_popup.h
Examining data/ufoai-2.5/src/client/ui/ui_render.cpp
Examining data/ufoai-2.5/src/client/ui/ui_render.h
Examining data/ufoai-2.5/src/client/ui/ui_sound.cpp
Examining data/ufoai-2.5/src/client/ui/ui_sound.h
Examining data/ufoai-2.5/src/client/ui/ui_sprite.cpp
Examining data/ufoai-2.5/src/client/ui/ui_sprite.h
Examining data/ufoai-2.5/src/client/ui/ui_timer.cpp
Examining data/ufoai-2.5/src/client/ui/ui_timer.h
Examining data/ufoai-2.5/src/client/ui/ui_tooltip.cpp
Examining data/ufoai-2.5/src/client/ui/ui_tooltip.h
Examining data/ufoai-2.5/src/client/ui/ui_windows.cpp
Examining data/ufoai-2.5/src/client/ui/ui_windows.h
Examining data/ufoai-2.5/src/client/web/web_cgame.cpp
Examining data/ufoai-2.5/src/client/web/web_cgame.h
Examining data/ufoai-2.5/src/client/web/web_main.cpp
Examining data/ufoai-2.5/src/client/web/web_main.h
Examining data/ufoai-2.5/src/common/binaryexpressionparser.cpp
Examining data/ufoai-2.5/src/common/binaryexpressionparser.h
Examining data/ufoai-2.5/src/common/bsp.cpp
Examining data/ufoai-2.5/src/common/bspslicer.cpp
Examining data/ufoai-2.5/src/common/bspslicer.h
Examining data/ufoai-2.5/src/common/cmd.cpp
Examining data/ufoai-2.5/src/common/cmd.h
Examining data/ufoai-2.5/src/common/cmodel.cpp
Examining data/ufoai-2.5/src/common/cmodel.h
Examining data/ufoai-2.5/src/common/common.cpp
Examining data/ufoai-2.5/src/common/common.h
Examining data/ufoai-2.5/src/common/cvar.cpp
Examining data/ufoai-2.5/src/common/cvar.h
Examining data/ufoai-2.5/src/common/dbuffer.cpp
Examining data/ufoai-2.5/src/common/dbuffer.h
Examining data/ufoai-2.5/src/common/doxygen.h
Examining data/ufoai-2.5/src/common/files.cpp
Examining data/ufoai-2.5/src/common/filesys.h
Examining data/ufoai-2.5/src/common/grid.cpp
Examining data/ufoai-2.5/src/common/grid.h
Examining data/ufoai-2.5/src/common/http.cpp
Examining data/ufoai-2.5/src/common/http.h
Examining data/ufoai-2.5/src/common/ioapi.cpp
Examining data/ufoai-2.5/src/common/ioapi.h
Examining data/ufoai-2.5/src/common/list.cpp
Examining data/ufoai-2.5/src/common/list.h
Examining data/ufoai-2.5/src/common/md4.cpp
Examining data/ufoai-2.5/src/common/md4.h
Examining data/ufoai-2.5/src/common/md5.cpp
Examining data/ufoai-2.5/src/common/mem.cpp
Examining data/ufoai-2.5/src/common/mem.h
Examining data/ufoai-2.5/src/common/msg.cpp
Examining data/ufoai-2.5/src/common/msg.h
Examining data/ufoai-2.5/src/common/net.cpp
Examining data/ufoai-2.5/src/common/net.h
Examining data/ufoai-2.5/src/common/netpack.cpp
Examining data/ufoai-2.5/src/common/netpack.h
Examining data/ufoai-2.5/src/common/pqueue.cpp
Examining data/ufoai-2.5/src/common/pqueue.h
Examining data/ufoai-2.5/src/common/qfiles.h
Examining data/ufoai-2.5/src/common/routing.cpp
Examining data/ufoai-2.5/src/common/routing.h
Examining data/ufoai-2.5/src/common/ScopedCommand.h
Examining data/ufoai-2.5/src/common/scripts.cpp
Examining data/ufoai-2.5/src/common/scripts.h
Examining data/ufoai-2.5/src/common/sha1.cpp
Examining data/ufoai-2.5/src/common/sha1.h
Examining data/ufoai-2.5/src/common/sha2.cpp
Examining data/ufoai-2.5/src/common/sha2.h
Examining data/ufoai-2.5/src/common/tracing.cpp
Examining data/ufoai-2.5/src/common/tracing.h
Examining data/ufoai-2.5/src/common/unzip.cpp
Examining data/ufoai-2.5/src/common/unzip.h
Examining data/ufoai-2.5/src/common/xml.h
Examining data/ufoai-2.5/src/common/xml.cpp
Examining data/ufoai-2.5/src/game/chr_shared.cpp
Examining data/ufoai-2.5/src/game/chr_shared.h
Examining data/ufoai-2.5/src/game/g_actor.cpp
Examining data/ufoai-2.5/src/game/g_actor.h
Examining data/ufoai-2.5/src/game/g_ai.cpp
Examining data/ufoai-2.5/src/game/g_ai.h
Examining data/ufoai-2.5/src/game/g_ai_lua.cpp
Examining data/ufoai-2.5/src/game/game.h
Examining data/ufoai-2.5/src/game/g_camera.cpp
Examining data/ufoai-2.5/src/game/g_client.cpp
Examining data/ufoai-2.5/src/game/g_client.h
Examining data/ufoai-2.5/src/game/g_cmds.cpp
Examining data/ufoai-2.5/src/game/g_combat.cpp
Examining data/ufoai-2.5/src/game/g_combat.h
Examining data/ufoai-2.5/src/game/g_edict.h
Examining data/ufoai-2.5/src/game/g_edicts.cpp
Examining data/ufoai-2.5/src/game/g_edicts.h
Examining data/ufoai-2.5/src/game/g_events.cpp
Examining data/ufoai-2.5/src/game/g_events.h
Examining data/ufoai-2.5/src/game/g_func.cpp
Examining data/ufoai-2.5/src/game/g_func.h
Examining data/ufoai-2.5/src/game/g_health.cpp
Examining data/ufoai-2.5/src/game/g_health.h
Examining data/ufoai-2.5/src/game/g_inventory.cpp
Examining data/ufoai-2.5/src/game/g_inventory.h
Examining data/ufoai-2.5/src/game/g_local.h
Examining data/ufoai-2.5/src/game/g_main.cpp
Examining data/ufoai-2.5/src/game/g_match.cpp
Examining data/ufoai-2.5/src/game/g_match.h
Examining data/ufoai-2.5/src/game/g_mission.cpp
Examining data/ufoai-2.5/src/game/g_mission.h
Examining data/ufoai-2.5/src/game/g_morale.cpp
Examining data/ufoai-2.5/src/game/g_move.cpp
Examining data/ufoai-2.5/src/game/g_move.h
Examining data/ufoai-2.5/src/game/g_reaction.cpp
Examining data/ufoai-2.5/src/game/g_reaction.h
Examining data/ufoai-2.5/src/game/g_round.cpp
Examining data/ufoai-2.5/src/game/g_spawn.cpp
Examining data/ufoai-2.5/src/game/g_spawn.h
Examining data/ufoai-2.5/src/game/g_stats.cpp
Examining data/ufoai-2.5/src/game/g_svcmds.cpp
Examining data/ufoai-2.5/src/game/g_trigger.cpp
Examining data/ufoai-2.5/src/game/g_trigger.h
Examining data/ufoai-2.5/src/game/g_utils.cpp
Examining data/ufoai-2.5/src/game/g_utils.h
Examining data/ufoai-2.5/src/game/g_vis.cpp
Examining data/ufoai-2.5/src/game/g_vis.h
Examining data/ufoai-2.5/src/game/inventory.cpp
Examining data/ufoai-2.5/src/game/inventory.h
Examining data/ufoai-2.5/src/game/inv_shared.h
Examining data/ufoai-2.5/src/game/lua/lapi.cpp
Examining data/ufoai-2.5/src/game/lua/lapi.h
Examining data/ufoai-2.5/src/game/lua/lauxlib.cpp
Examining data/ufoai-2.5/src/game/lua/lauxlib.h
Examining data/ufoai-2.5/src/game/lua/lbaselib.cpp
Examining data/ufoai-2.5/src/game/lua/lcode.cpp
Examining data/ufoai-2.5/src/game/lua/lcode.h
Examining data/ufoai-2.5/src/game/lua/ldblib.cpp
Examining data/ufoai-2.5/src/game/lua/ldebug.cpp
Examining data/ufoai-2.5/src/game/lua/ldebug.h
Examining data/ufoai-2.5/src/game/lua/ldo.cpp
Examining data/ufoai-2.5/src/game/lua/ldo.h
Examining data/ufoai-2.5/src/game/lua/ldump.cpp
Examining data/ufoai-2.5/src/game/lua/lfunc.cpp
Examining data/ufoai-2.5/src/game/lua/lfunc.h
Examining data/ufoai-2.5/src/game/lua/lgc.cpp
Examining data/ufoai-2.5/src/game/lua/lgc.h
Examining data/ufoai-2.5/src/game/lua/linit.cpp
Examining data/ufoai-2.5/src/game/lua/liolib.cpp
Examining data/ufoai-2.5/src/game/lua/llex.cpp
Examining data/ufoai-2.5/src/game/lua/llex.h
Examining data/ufoai-2.5/src/game/lua/llimits.h
Examining data/ufoai-2.5/src/game/lua/lmathlib.cpp
Examining data/ufoai-2.5/src/game/lua/lmem.cpp
Examining data/ufoai-2.5/src/game/lua/lmem.h
Examining data/ufoai-2.5/src/game/lua/loadlib.cpp
Examining data/ufoai-2.5/src/game/lua/lobject.cpp
Examining data/ufoai-2.5/src/game/lua/lobject.h
Examining data/ufoai-2.5/src/game/lua/lopcodes.cpp
Examining data/ufoai-2.5/src/game/lua/lopcodes.h
Examining data/ufoai-2.5/src/game/lua/loslib.cpp
Examining data/ufoai-2.5/src/game/lua/lparser.cpp
Examining data/ufoai-2.5/src/game/lua/lparser.h
Examining data/ufoai-2.5/src/game/lua/lstate.cpp
Examining data/ufoai-2.5/src/game/lua/lstate.h
Examining data/ufoai-2.5/src/game/lua/lstring.cpp
Examining data/ufoai-2.5/src/game/lua/lstring.h
Examining data/ufoai-2.5/src/game/lua/lstrlib.cpp
Examining data/ufoai-2.5/src/game/lua/ltable.cpp
Examining data/ufoai-2.5/src/game/lua/ltable.h
Examining data/ufoai-2.5/src/game/lua/ltablib.cpp
Examining data/ufoai-2.5/src/game/lua/ltm.cpp
Examining data/ufoai-2.5/src/game/lua/ltm.h
Examining data/ufoai-2.5/src/game/lua/luaconf.h
Examining data/ufoai-2.5/src/game/lua/lua.h
Examining data/ufoai-2.5/src/game/lua/lualib.h
Examining data/ufoai-2.5/src/game/lua/lundump.cpp
Examining data/ufoai-2.5/src/game/lua/lundump.h
Examining data/ufoai-2.5/src/game/lua/lvm.cpp
Examining data/ufoai-2.5/src/game/lua/lvm.h
Examining data/ufoai-2.5/src/game/lua/lzio.cpp
Examining data/ufoai-2.5/src/game/lua/lzio.h
Examining data/ufoai-2.5/src/game/lua/print.cpp
Examining data/ufoai-2.5/src/game/q_shared.cpp
Examining data/ufoai-2.5/src/game/q_shared.h
Examining data/ufoai-2.5/src/game/q_sizes.h
Examining data/ufoai-2.5/src/game/srvedict.h
Examining data/ufoai-2.5/src/game/inv_shared.cpp
Examining data/ufoai-2.5/src/libs/mumble/libmumblelink.c
Examining data/ufoai-2.5/src/libs/mumble/libmumblelink.h
Examining data/ufoai-2.5/src/libs/picomodel/picointernal.c
Examining data/ufoai-2.5/src/libs/picomodel/picointernal.h
Examining data/ufoai-2.5/src/libs/picomodel/picomodel.c
Examining data/ufoai-2.5/src/libs/picomodel/picomodel.h
Examining data/ufoai-2.5/src/libs/picomodel/picomodules.c
Examining data/ufoai-2.5/src/libs/picomodel/pm_ase.c
Examining data/ufoai-2.5/src/libs/picomodel/pm_md2.c
Examining data/ufoai-2.5/src/libs/picomodel/pm_md3.c
Examining data/ufoai-2.5/src/libs/picomodel/pm_obj.c
Examining data/ufoai-2.5/src/ports/android/android_console.cpp
Examining data/ufoai-2.5/src/ports/android/android_debugger.cpp
Examining data/ufoai-2.5/src/ports/android/android_debugger.h
Examining data/ufoai-2.5/src/ports/android/android_main.cpp
Examining data/ufoai-2.5/src/ports/android/android_system.cpp
Examining data/ufoai-2.5/src/ports/android/config_android.h
Examining data/ufoai-2.5/src/ports/android/r_gles_android.h
Examining data/ufoai-2.5/src/ports/linux/linux_main.cpp
Examining data/ufoai-2.5/src/ports/macosx/osx_main.cpp
Examining data/ufoai-2.5/src/ports/macosx/osx_shared.cpp
Examining data/ufoai-2.5/src/ports/solaris/solaris_main.cpp
Examining data/ufoai-2.5/src/ports/system.h
Examining data/ufoai-2.5/src/ports/unix/unix_console.cpp
Examining data/ufoai-2.5/src/ports/unix/unix_files.cpp
Examining data/ufoai-2.5/src/ports/unix/unix_main.cpp
Examining data/ufoai-2.5/src/ports/unix/unix_shared.cpp
Examining data/ufoai-2.5/src/ports/windows/win_backtrace.cpp
Examining data/ufoai-2.5/src/ports/windows/win_console.cpp
Examining data/ufoai-2.5/src/ports/windows/win_local.h
Examining data/ufoai-2.5/src/ports/windows/win_main.cpp
Examining data/ufoai-2.5/src/ports/windows/win_shared.cpp
Examining data/ufoai-2.5/src/server/server.h
Examining data/ufoai-2.5/src/server/sv_ccmds.cpp
Examining data/ufoai-2.5/src/server/sv_clientstub.cpp
Examining data/ufoai-2.5/src/server/sv_game.cpp
Examining data/ufoai-2.5/src/server/sv_init.cpp
Examining data/ufoai-2.5/src/server/sv_log.cpp
Examining data/ufoai-2.5/src/server/sv_log.h
Examining data/ufoai-2.5/src/server/sv_main.cpp
Examining data/ufoai-2.5/src/server/sv_mapcycle.cpp
Examining data/ufoai-2.5/src/server/sv_rma.cpp
Examining data/ufoai-2.5/src/server/sv_rma.h
Examining data/ufoai-2.5/src/server/sv_send.cpp
Examining data/ufoai-2.5/src/server/sv_user.cpp
Examining data/ufoai-2.5/src/server/sv_world.cpp
Examining data/ufoai-2.5/src/shared/aabb.cpp
Examining data/ufoai-2.5/src/shared/aabb.h
Examining data/ufoai-2.5/src/shared/autoptr.h
Examining data/ufoai-2.5/src/shared/bfd.cpp
Examining data/ufoai-2.5/src/shared/bfd.h
Examining data/ufoai-2.5/src/shared/byte.cpp
Examining data/ufoai-2.5/src/shared/byte.h
Examining data/ufoai-2.5/src/shared/cxx.h
Examining data/ufoai-2.5/src/shared/defines.h
Examining data/ufoai-2.5/src/shared/entitiesdef.cpp
Examining data/ufoai-2.5/src/shared/entitiesdef.h
Examining data/ufoai-2.5/src/shared/images.cpp
Examining data/ufoai-2.5/src/shared/images.h
Examining data/ufoai-2.5/src/shared/infostring.cpp
Examining data/ufoai-2.5/src/shared/infostring.h
Examining data/ufoai-2.5/src/shared/keyvaluepair.h
Examining data/ufoai-2.5/src/shared/line.h
Examining data/ufoai-2.5/src/shared/mathlib.cpp
Examining data/ufoai-2.5/src/shared/mathlib_extra.cpp
Examining data/ufoai-2.5/src/shared/mathlib_extra.h
Examining data/ufoai-2.5/src/shared/mathlib.h
Examining data/ufoai-2.5/src/shared/parse.cpp
Examining data/ufoai-2.5/src/shared/parse.h
Examining data/ufoai-2.5/src/shared/scopedmutex.h
Examining data/ufoai-2.5/src/shared/shared.cpp
Examining data/ufoai-2.5/src/shared/shared.h
Examining data/ufoai-2.5/src/shared/sharedptr.h
Examining data/ufoai-2.5/src/shared/stringhunk.cpp
Examining data/ufoai-2.5/src/shared/stringhunk.h
Examining data/ufoai-2.5/src/shared/typedefs.h
Examining data/ufoai-2.5/src/shared/ufotypes.h
Examining data/ufoai-2.5/src/shared/utf8.cpp
Examining data/ufoai-2.5/src/shared/utf8.h
Examining data/ufoai-2.5/src/shared/vector.h
Examining data/ufoai-2.5/src/shared/vertex_normals.h
Examining data/ufoai-2.5/src/tests/test_all.cpp
Examining data/ufoai-2.5/src/tests/test_campaign.cpp
Examining data/ufoai-2.5/src/tests/test_campaign.h
Examining data/ufoai-2.5/src/tests/test_character.cpp
Examining data/ufoai-2.5/src/tests/test_character.h
Examining data/ufoai-2.5/src/tests/test_dbuffer.cpp
Examining data/ufoai-2.5/src/tests/test_dbuffer.h
Examining data/ufoai-2.5/src/tests/test_events.cpp
Examining data/ufoai-2.5/src/tests/test_events.h
Examining data/ufoai-2.5/src/tests/test_game.cpp
Examining data/ufoai-2.5/src/tests/test_game.h
Examining data/ufoai-2.5/src/tests/test_generic.cpp
Examining data/ufoai-2.5/src/tests/test_generic.h
Examining data/ufoai-2.5/src/tests/test_inventory.cpp
Examining data/ufoai-2.5/src/tests/test_inventory.h
Examining data/ufoai-2.5/src/tests/test_mapdef.cpp
Examining data/ufoai-2.5/src/tests/test_mapdef.h
Examining data/ufoai-2.5/src/tests/test_mathlibextra.cpp
Examining data/ufoai-2.5/src/tests/test_mathlibextra.h
Examining data/ufoai-2.5/src/tests/test_parser.cpp
Examining data/ufoai-2.5/src/tests/test_parser.h
Examining data/ufoai-2.5/src/tests/test_particles.cpp
Examining data/ufoai-2.5/src/tests/test_particles.h
Examining data/ufoai-2.5/src/tests/test_renderer.cpp
Examining data/ufoai-2.5/src/tests/test_renderer.h
Examining data/ufoai-2.5/src/tests/test_rma.cpp
Examining data/ufoai-2.5/src/tests/test_rma.h
Examining data/ufoai-2.5/src/tests/test_routing.cpp
Examining data/ufoai-2.5/src/tests/test_routing.h
Examining data/ufoai-2.5/src/tests/test_scripts.cpp
Examining data/ufoai-2.5/src/tests/test_scripts.h
Examining data/ufoai-2.5/src/tests/test_shared.cpp
Examining data/ufoai-2.5/src/tests/test_shared.h
Examining data/ufoai-2.5/src/tests/test_ui.cpp
Examining data/ufoai-2.5/src/tests/test_ui.h
Examining data/ufoai-2.5/src/tests/test_ui_level2.cpp
Examining data/ufoai-2.5/src/tests/test_ui_level2.h
Examining data/ufoai-2.5/src/tests/test_webapi.cpp
Examining data/ufoai-2.5/src/tests/test_webapi.h
Examining data/ufoai-2.5/src/tools/addr2line.cpp
Examining data/ufoai-2.5/src/tools/gldummy.cpp
Examining data/ufoai-2.5/src/tools/memory.cpp
Examining data/ufoai-2.5/src/tools/radiant/include/Bounded.h
Examining data/ufoai-2.5/src/tools/radiant/include/cullable.h
Examining data/ufoai-2.5/src/tools/radiant/include/editable.h
Examining data/ufoai-2.5/src/tools/radiant/include/iarchive.h
Examining data/ufoai-2.5/src/tools/radiant/include/ibrush.h
Examining data/ufoai-2.5/src/tools/radiant/include/icamera.h
Examining data/ufoai-2.5/src/tools/radiant/include/iclipper.h
Examining data/ufoai-2.5/src/tools/radiant/include/idatastream.h
Examining data/ufoai-2.5/src/tools/radiant/include/ieclass.h
Examining data/ufoai-2.5/src/tools/radiant/include/ientity.h
Examining data/ufoai-2.5/src/tools/radiant/include/ieventmanager.h
Examining data/ufoai-2.5/src/tools/radiant/include/ifilesystem.h
Examining data/ufoai-2.5/src/tools/radiant/include/ifiletypes.h
Examining data/ufoai-2.5/src/tools/radiant/include/ifilter.h
Examining data/ufoai-2.5/src/tools/radiant/include/igamemanager.h
Examining data/ufoai-2.5/src/tools/radiant/include/igl.h
Examining data/ufoai-2.5/src/tools/radiant/include/iglrender.h
Examining data/ufoai-2.5/src/tools/radiant/include/igrid.h
Examining data/ufoai-2.5/src/tools/radiant/include/iimage.h
Examining data/ufoai-2.5/src/tools/radiant/include/imapcompiler.h
Examining data/ufoai-2.5/src/tools/radiant/include/imap.h
Examining data/ufoai-2.5/src/tools/radiant/include/imaterial.h
Examining data/ufoai-2.5/src/tools/radiant/include/imodel.h
Examining data/ufoai-2.5/src/tools/radiant/include/inamespace.h
Examining data/ufoai-2.5/src/tools/radiant/include/inode.h
Examining data/ufoai-2.5/src/tools/radiant/include/ioverlay.h
Examining data/ufoai-2.5/src/tools/radiant/include/iparticles.h
Examining data/ufoai-2.5/src/tools/radiant/include/ipathfinding.h
Examining data/ufoai-2.5/src/tools/radiant/include/iradiant.h
Examining data/ufoai-2.5/src/tools/radiant/include/ireference.h
Examining data/ufoai-2.5/src/tools/radiant/include/iregistry.h
Examining data/ufoai-2.5/src/tools/radiant/include/irender.h
Examining data/ufoai-2.5/src/tools/radiant/include/iscenegraph.h
Examining data/ufoai-2.5/src/tools/radiant/include/iscriplib.h
Examining data/ufoai-2.5/src/tools/radiant/include/iselection.h
Examining data/ufoai-2.5/src/tools/radiant/include/iselectionset.h
Examining data/ufoai-2.5/src/tools/radiant/include/ishader.h
Examining data/ufoai-2.5/src/tools/radiant/include/ishaderlayer.h
Examining data/ufoai-2.5/src/tools/radiant/include/ishadersystem.h
Examining data/ufoai-2.5/src/tools/radiant/include/isound.h
Examining data/ufoai-2.5/src/tools/radiant/include/itexdef.h
Examining data/ufoai-2.5/src/tools/radiant/include/itextstream.h
Examining data/ufoai-2.5/src/tools/radiant/include/itextures.h
Examining data/ufoai-2.5/src/tools/radiant/include/itraversable.h
Examining data/ufoai-2.5/src/tools/radiant/include/iufoscript.h
Examining data/ufoai-2.5/src/tools/radiant/include/iuimanager.h
Examining data/ufoai-2.5/src/tools/radiant/include/iump.h
Examining data/ufoai-2.5/src/tools/radiant/include/iundo.h
Examining data/ufoai-2.5/src/tools/radiant/include/mapfile.h
Examining data/ufoai-2.5/src/tools/radiant/include/moduleobserver.h
Examining data/ufoai-2.5/src/tools/radiant/include/modulesystem.h
Examining data/ufoai-2.5/src/tools/radiant/include/nameable.h
Examining data/ufoai-2.5/src/tools/radiant/include/preferencesystem.h
Examining data/ufoai-2.5/src/tools/radiant/include/radiant_i18n.h
Examining data/ufoai-2.5/src/tools/radiant/include/renderable.h
Examining data/ufoai-2.5/src/tools/radiant/include/selectable.h
Examining data/ufoai-2.5/src/tools/radiant/include/shared.h
Examining data/ufoai-2.5/src/tools/radiant/include/version.h
Examining data/ufoai-2.5/src/tools/radiant/include/VolumeIntersectionValue.h
Examining data/ufoai-2.5/src/tools/radiant/include/windowobserver.h
Examining data/ufoai-2.5/src/tools/radiant/libs/archivelib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/bytestreamutils.h
Examining data/ufoai-2.5/src/tools/radiant/libs/character.h
Examining data/ufoai-2.5/src/tools/radiant/libs/container/array.h
Examining data/ufoai-2.5/src/tools/radiant/libs/container/cache.h
Examining data/ufoai-2.5/src/tools/radiant/libs/container/container.h
Examining data/ufoai-2.5/src/tools/radiant/libs/container/hashfunc.h
Examining data/ufoai-2.5/src/tools/radiant/libs/container/hashtable.h
Examining data/ufoai-2.5/src/tools/radiant/libs/container/stack.h
Examining data/ufoai-2.5/src/tools/radiant/libs/debugging/debugging.h
Examining data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/entitylib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/ExecutionTime.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/arrayrange.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/bitfield.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/callbackfwd.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/callback.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/constant.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/enumeration.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/functional.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/object.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/referencecounted.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/reference.h
Examining data/ufoai-2.5/src/tools/radiant/libs/generic/static.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/button.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/button.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/clipboard.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/clipboard.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/closure.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ComboBox.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/container.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ControlButton.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/cursor.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/cursor.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/dialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/dialog.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/entry.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/event/SingleIdleCallback.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/filechooser.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/filechooser.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/frame.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/FramedTransientWidget.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/FramedWidget.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/frame.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/glfont.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/glfont.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/glwidget.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/glwidget.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/GLWidgetSentry.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/IconTextButton.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/IconTextColumn.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/IconTextMenuItem.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/IconTextMenuToggle.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/IConv.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/idledraw.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ifc/EditorWidget.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ifc/Widget.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/image.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/image.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/LeftAlignedLabel.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/LeftAlignment.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/menu.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/menu.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/MenuItemAccelerator.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/MenuItemAccelerator.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/menu/PopupMenu.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/menu/PopupMenu.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/messagebox.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/messagebox.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ModalInfoDialog.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ModalProgressDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ModalProgressDialog.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/MultiMonitor.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/PanedPosition.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/PanedPosition.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/pointer.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/RegistryConnector.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/RegistryConnector.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/RightAlignedLabel.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/RightAlignment.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/ScrolledFrame.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/SeparatorMenuItem.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/SourceView.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/SourceView.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/StockIconMenuItem.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextButton.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextColumn.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextEntryDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextEntryDialog.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextMenuItem.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextMenuItemToggle.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextPanel.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TextPanel.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/Timer.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/Timer.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TreeModel.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/TreeModel.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/VFSTreePopulator.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/VFSTreePopulator.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/widget.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window/BlockingTransientWindow.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window/DialogWindow.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window/PersistentTransientWindow.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window/PersistentTransientWindow.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window/TransientWindow.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/WindowPosition.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/WindowPosition.h
Examining data/ufoai-2.5/src/tools/radiant/libs/gtkutil/xorrectangle.h
Examining data/ufoai-2.5/src/tools/radiant/libs/imagelib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/Instance.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/instancelib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/aabb.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/expression.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/FloatTools.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/frustum.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/line.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/lrint.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/matrix.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/pi.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/Plane3.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/quaternion.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/Vector2.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/Vector3.h
Examining data/ufoai-2.5/src/tools/radiant/libs/math/Vector4.h
Examining data/ufoai-2.5/src/tools/radiant/libs/memory/allocator.h
Examining data/ufoai-2.5/src/tools/radiant/libs/moduleobservers.h
Examining data/ufoai-2.5/src/tools/radiant/libs/modulesystem/moduleregistry.h
Examining data/ufoai-2.5/src/tools/radiant/libs/modulesystem/modulesmap.h
Examining data/ufoai-2.5/src/tools/radiant/libs/modulesystem/singletonmodule.h
Examining data/ufoai-2.5/src/tools/radiant/libs/os/dir.h
Examining data/ufoai-2.5/src/tools/radiant/libs/os/file.h
Examining data/ufoai-2.5/src/tools/radiant/libs/os/path.h
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/model.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/model.h
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/PicoModelNode.h
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/RenderablePicoModel.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/RenderablePicoModel.h
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/RenderablePicoSurface.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/RenderablePicoSurface.h
Examining data/ufoai-2.5/src/tools/radiant/libs/picomodel/SkinnedModel.h
Examining data/ufoai-2.5/src/tools/radiant/libs/pivot.h
Examining data/ufoai-2.5/src/tools/radiant/libs/render.h
Examining data/ufoai-2.5/src/tools/radiant/libs/scenelib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/selectionlib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/shaderlib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/signal/isignal.h
Examining data/ufoai-2.5/src/tools/radiant/libs/signal/signalfwd.h
Examining data/ufoai-2.5/src/tools/radiant/libs/signal/signal.h
Examining data/ufoai-2.5/src/tools/radiant/libs/Singleton.h
Examining data/ufoai-2.5/src/tools/radiant/libs/stream/filestream.h
Examining data/ufoai-2.5/src/tools/radiant/libs/stream/memstream.h
Examining data/ufoai-2.5/src/tools/radiant/libs/stream/stringstream.h
Examining data/ufoai-2.5/src/tools/radiant/libs/stream/textfilestream.h
Examining data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h
Examining data/ufoai-2.5/src/tools/radiant/libs/stringio.h
Examining data/ufoai-2.5/src/tools/radiant/libs/string/string.h
Examining data/ufoai-2.5/src/tools/radiant/libs/string/StringTokeniser.h
Examining data/ufoai-2.5/src/tools/radiant/libs/string/WildcardMatcher.h
Examining data/ufoai-2.5/src/tools/radiant/libs/texturelib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/transformlib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/traverselib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/undolib.h
Examining data/ufoai-2.5/src/tools/radiant/libs/uniquenames.h
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/Document.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/Document.h
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/InvalidNodeException.h
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/MissingXMLNodeException.h
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/Node.cpp
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/Node.h
Examining data/ufoai-2.5/src/tools/radiant/libs/xmlutil/XPathException.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushClipPlane.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushClipPlane.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/Brush.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/Brush.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/brushmanip.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/brushmanip.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushModule.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushTokens.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushTokens.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/BrushVisit.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/BrushConstructor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Cone.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Cone.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Cuboid.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Cuboid.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Prism.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Prism.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Rock.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Rock.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Sphere.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Sphere.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Terrain.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Terrain.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/ContentsFlagsValue.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/ContentsFlagsValue.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/csg/csg.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/csg/csg.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/EdgeInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/Face.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/Face.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FacePlane.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceShader.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceShader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceTexDef.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceTexDef.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceTokenExporter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/FaceTokenImporter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/PlanePoints.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/RenderableWireFrame.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/SelectableComponents.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/TexDef.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/TexDef.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/TextureProjection.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/TextureProjection.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/VertexInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/VertexSelection.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/winding.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brush/winding.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brushexport/BrushExportOBJ.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/brushexport/BrushExportOBJ.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brushexport/Exporter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/brushexport/WaveFrontBrushVisitor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/Camera.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/Camera.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/CameraObserver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/CameraSettings.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/CameraSettings.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/CamRenderer.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/CamWnd.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/CamWnd.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/GlobalCamera.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/GlobalCamera.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/RadiantCameraView.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/view.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/camera/view.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/clipper/Clipper.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/clipper/Clipper.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/clipper/ClipPoint.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/clipper/ClipPoint.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/commands.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/commands.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/dialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/dialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/eclassmodel/EClassModel.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/eclassmodel/EClassModel.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/eclassmodel/EClassModelInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/eclassmodel/EClassModelInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/eclassmodel/EClassModelNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/eclassmodel/EClassModelNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entity.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/EntityCreator.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/EntityCreator.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityClassManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityClassManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityClassMgrModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityClassScanner.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityClassScanner.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityDefinitionModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entity.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/entitymodule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/EntitySettings.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/EntitySettings.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/generic/GenericEntity.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/generic/GenericEntity.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/generic/GenericEntityInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/generic/GenericEntityInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/generic/GenericEntityNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/generic/GenericEntityNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/group/Group.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/group/Group.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/group/GroupInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/group/GroupInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/group/GroupNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/group/GroupNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/AngleKey.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/AnglesKey.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/ColourKey.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/KeyObserverMap.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/OriginKey.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/ScaleKey.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/Light.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/Light.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/LightInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/LightInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/LightNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/LightNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/RenderLightRadiusBox.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/RenderLightRadiusFill.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/light/RenderLightRadiusWire.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model/MiscModel.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model/MiscModel.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model/MiscModelInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model/MiscModelInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model/MiscModelNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/model/MiscModelNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/namedentity.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/NameKeys.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/MiscParticle.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/MiscParticle.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/MiscParticleInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/MiscParticleInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/MiscParticleNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/MiscParticleNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/RenderableParticle.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/particle/RenderableParticleID.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/RenderableArrow.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/sound/MiscSound.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/sound/MiscSound.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/sound/MiscSoundInstance.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/sound/MiscSoundInstance.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/sound/MiscSoundNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/sound/MiscSoundNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/targetable.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/entity/targetable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/environment.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/environment.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Accelerator.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Accelerator.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Command.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Command.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Event.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/EventManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/KeyEvent.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Modifiers.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Modifiers.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/MouseEvents.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/MouseEvents.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/RegistryToggle.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/SaveEventVisitor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Toggle.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/Toggle.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/WidgetToggle.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/eventmanager/WidgetToggle.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/exec.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/exec.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/directory/DirectoryArchive.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/directory/DirectoryArchive.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/directory/UnixPath.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/DirectoryVisitor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/FileSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/FileSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/FileSystemModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/FileSystemModule.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/FileVisitor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/archivezip.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/DeflatedArchiveFile.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/DeflatedArchiveTextFile.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/DeflatedInputStream.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/GenericFileSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/pkzip.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/ZipArchive.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/ZipArchive.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filetypes.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filetypes.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/BasicFilterSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/BasicFilterSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/filters.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/InstanceUpdateWalker.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/LevelFilter.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/LevelFilter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/XMLFilter.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/filters/XMLFilter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/image.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/image.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/imagemodules.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/log/console.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/log/console.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/main.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/algorithm/Clone.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/algorithm/Merge.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/algorithm/Traverse.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/algorithm/Traverse.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/AutoSaver.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/AutoSaver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/BasicContainer.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/CounterManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/DeferredDraw.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/MapCompileException.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/MapCompiler.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/MapCompiler.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/map.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/MapFileChooserPreview.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/MapFileChooserPreview.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/map.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/mapmodule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/MoveLevelWalker.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/parse.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/parse.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/RegionWalkers.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/RootNode.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/RootNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/UndoFileChangeTracker.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/write.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/map/write.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/LicenseParser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/LicenseParser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialShader.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialShader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialShaderModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialShaderSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialShaderSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/material/MaterialSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/model.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/model.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/namespace/NameObserver.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/namespace/NameObserver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/namespace/Namespace.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/namespace/Namespace.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/namespace/NamespaceModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/namespace/NamespaceModule.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/particles/ParticleDefinition.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/particles/ParticleParser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/particles/ParticleParser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/particles/ParticleSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/particles/ParticleSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/Pathfinding.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/Pathfinding.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/PathfindingModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/Routing.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/Routing.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingLump.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingLump.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingLumpLoader.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingLumpLoader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingRenderable.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingRenderable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/plugin.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/plugin.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/referencecache/nullmodel.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/referencecache/nullmodel.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/referencecache/referencecache.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/referencecache/referencecache.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLShaderCache.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLShader.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLShader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLShaderPass.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLShaderPass.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLStateBucketAdd.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLStateLess.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLStateManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/backend/OpenGLStateMap.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/frontend/CullingWalker.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/frontend/ForEachVisible.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/frontend/RenderHighlighted.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/frontend/SphereRenderable.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/frontend/SphereRenderable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/OpenGLModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/OpenGLRenderSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/OpenGLRenderSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/render/RenderStatistics.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/renderer.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/scenegraph/CompiledGraph.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/scenegraph/CompiledGraph.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/scenegraph/SceneGraphModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/scenegraph/SceneGraphModule.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/scenegraph/treemodel.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/scenegraph/treemodel.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptLibrary.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptLibrary.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptLibraryModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptTokeniser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptTokeniser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptTokenWriter.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptTokenWriter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/select.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/select.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Entity.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Entity.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/General.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/General.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Group.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Group.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Primitives.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Primitives.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/SelectionPolicies.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Shader.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Shader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Transformation.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/algorithm/Transformation.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/BestPoint.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/BestPoint.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Device.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Intersection.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Intersection.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Manipulatables.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Manipulatables.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/ManipulateObserver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Manipulators.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Manipulators.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Planes.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Planes.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/RadiantSelectionSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/RadiantSelectionSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/RadiantWindowObserver.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/RadiantWindowObserver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Remap.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Renderables.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/SceneWalkers.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/SelectionBox.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/selectionset/SelectionSet.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/selectionset/SelectionSet.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/selectionset/SelectionSetManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/selectionset/SelectionSetManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/selectionset/SelectionSetToolmenu.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/selectionset/SelectionSetToolmenu.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/SelectionSystemModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/SelectionTest.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/SelectionTest.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/SelectObserver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/Selectors.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/shaderclipboard/ShaderClipboard.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/shaderclipboard/ShaderClipboard.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/shaderclipboard/Texturable.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/shaderclipboard/Texturable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/TransformationVisitors.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/selection/TransformationVisitors.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/server.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/server.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/GameDescription.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/GameDescription.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/GameManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/GameManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/GameManagerModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/PreferenceDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/PreferenceDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/preferencedictionary.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/Win32Registry.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/settings/Win32Registry.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/AddPropertyDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/AddPropertyDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/BooleanPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/BooleanPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/ColourPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/ColourPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/EntityInspector.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/EntityInspector.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/EntityPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/EntityPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/FloatPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/FloatPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/ModelPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/ModelPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/ParticlePropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/ParticlePropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/PropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/PropertyEditorFactory.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/PropertyEditorFactory.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/PropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SkinChooser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SkinChooser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SkinPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SkinPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SoundPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SoundPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SpawnflagsPropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/SpawnflagsPropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/Vector3PropertyEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entityinspector/Vector3PropertyEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/EntityList.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/EntityList.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/GraphTreeModel.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/GraphTreeModel.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/GraphTreeModelPopulator.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/GraphTreeModelSelectionUpdater.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/entitylist/GraphTreeNode.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/JobInfo.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/JobInfo.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/MapInfo.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/MapInfo.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/PrefabSelector.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/PrefabSelector.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/sidebar.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/sidebar.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/surfaceinspector/surfaceinspector.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/surfaceinspector/surfaceinspector.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/texturebrowser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sidebar/texturebrowser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/OggFileStream.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/OpenAL.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundManagerModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundPlayer.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundPlayer.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/stacktrace.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/stacktrace.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/item/BrushItem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/item/BrushItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/item/FaceItem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/item/FaceItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/item/FaceVertexItem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/item/FaceVertexItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/Rectangle.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/Renderable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/Selectable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/TexTool.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/TexTool.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/TexToolItem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/TexToolItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textool/Transformable.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textureentry.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textures/Texture.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textures/TexturesMap.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/textures/TexturesMap.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/textures/TexturesModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/timer.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/timer.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/common/DataBlock.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/common/DataBlock.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/common/Parser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/common/Parser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/common/ScriptValues.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/common/ScriptValues.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/mapdef/MapDef.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/mapdef/MapDef.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/terrain/Terrain.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/terrain/Terrain.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ufoscript/UFOScript.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/about/AboutDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/about/AboutDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/brush/QuerySidesDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/brush/QuerySidesDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/colourscheme/ColourScheme.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/colourscheme/ColourSchemeEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/colourscheme/ColourSchemeEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/colourscheme/ColourScheme.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/colourscheme/ColourSchemeManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/colourscheme/ColourSchemeManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/commandlist/CommandList.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/commandlist/CommandList.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/commandlist/CommandListPopulator.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/commandlist/ShortcutChooser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/commandlist/ShortcutChooser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/MapPreview.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/MapPreview.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/MapPreviewView.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/MaterialDefinitionView.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/MaterialDefinitionView.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ModelPreview.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ModelPreview.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/RenderableAABB.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/RenderableAABB.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ShaderChooser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ShaderChooser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ShaderSelector.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ShaderSelector.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/SoundChooser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/SoundChooser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/SoundPreview.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/SoundPreview.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/TexturePreviewCombo.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/TexturePreviewCombo.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ToolbarCreator.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/ToolbarCreator.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/UFOScriptDefinitionView.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/UFOScriptDefinitionView.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/UMPDefinitionView.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/common/UMPDefinitionView.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/filterdialog/FilterDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/filterdialog/FilterDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/filterdialog/FilterEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/filterdialog/FilterEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/filterdialog/Filter.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/findbrush/findbrush.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/findbrush/findbrush.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/findshader/FindShader.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/findshader/FindShader.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/Icons.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/lightdialog/LightDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/lightdialog/LightDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mainframe/mainframe.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mainframe/mainframe.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mainframe/SplitPaneLayout.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mainframe/SplitPaneLayout.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/maptools/CompilerObserver.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/maptools/ErrorCheckDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/maptools/ErrorCheckDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/materialeditor/MaterialEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/materialeditor/MaterialEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/menu/FiltersMenu.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/menu/FiltersMenu.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/menu/UMPMenu.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/menu/UMPMenu.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/modelselector/ModelSelector.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/modelselector/ModelSelector.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mru/MRU.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mru/MRU.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mru/MRUList.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mru/MRUMenuItem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/mru/MRUMenuItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/ortho/EntityClassChooser.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/ortho/EntityClassChooser.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/ortho/OrthoContextMenu.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/ortho/OrthoContextMenu.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/overlay/Overlay.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/particles/ParticleEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/particles/ParticleEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/particles/ParticlePreview.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/particles/ParticlePreview.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/particles/ParticleSelector.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/particles/ParticleSelector.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/prefdialog/EnginePathDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/scripteditor/UFOScriptEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/scripteditor/UFOScriptEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/splash/Splash.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/splash/Splash.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/textureoverview/TextureOverviewDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/textureoverview/TextureOverviewDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/transform/TransformDialog.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/transform/TransformDialog.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/uimanager/MenuItem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/uimanager/MenuItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/uimanager/MenuManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/uimanager/MenuManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/uimanager/UIManager.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/uimanager/UIManager.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/umpeditor/UMPEditor.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ui/umpeditor/UMPEditor.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPAssembly.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPAssembly.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPException.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPFile.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPFile.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPTile.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/ump/UMPTile.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/Operation.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/RadiantUndoSystem.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/RadiantUndoSystem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/RadiantUndoSystemModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/SnapShot.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/StackFiller.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/Stack.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/UndoStateTracker.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/undo/UndoStateTracker.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/url.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/url.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/windowobservers.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/windowobservers.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/xmlregistry/RegistryTree.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/xmlregistry/RegistryTree.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/xmlregistry/XMLRegistry.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/xmlregistry/XMLRegistry.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/xmlregistry/XMLRegistryModule.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/GlobalXYWnd.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/GlobalXYWnd.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/grid/Grid.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/grid/GridItem.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYRenderer.h
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.cpp
Examining data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.h
Examining data/ufoai-2.5/src/tools/ufo2map/bspbrush.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/bspbrush.h
Examining data/ufoai-2.5/src/tools/ufo2map/bsp.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/bsp.h
Examining data/ufoai-2.5/src/tools/ufo2map/check/check.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/check/checkentities.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/check/checkentities.h
Examining data/ufoai-2.5/src/tools/ufo2map/check/check.h
Examining data/ufoai-2.5/src/tools/ufo2map/check/checklib.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/check/checklib.h
Examining data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/common/aselib.h
Examining data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/common/bspfile.h
Examining data/ufoai-2.5/src/tools/ufo2map/common/polylib.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/common/polylib.h
Examining data/ufoai-2.5/src/tools/ufo2map/common/scriplib.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/common/scriplib.h
Examining data/ufoai-2.5/src/tools/ufo2map/common/shared.h
Examining data/ufoai-2.5/src/tools/ufo2map/common/trace.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/csg.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/faces.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/levels.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/levels.h
Examining data/ufoai-2.5/src/tools/ufo2map/lighting.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/lighting.h
Examining data/ufoai-2.5/src/tools/ufo2map/lightmap.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/map.h
Examining data/ufoai-2.5/src/tools/ufo2map/patches.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/portals.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/routing.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/textures.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/textures.h
Examining data/ufoai-2.5/src/tools/ufo2map/threads.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/tree.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/ufo2map.h
Examining data/ufoai-2.5/src/tools/ufo2map/writebsp.cpp
Examining data/ufoai-2.5/src/tools/ufo2map/map.cpp
Examining data/ufoai-2.5/src/tools/ufomodel/md2.cpp
Examining data/ufoai-2.5/src/tools/ufomodel/md2.h
Examining data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp
Examining data/ufoai-2.5/src/tools/ufoslicer.cpp

FINAL RESULTS:

data/ufoai-2.5/src/client/cl_irc.cpp:707:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, params);
data/ufoai-2.5/src/client/cl_irc.cpp:732:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, params);
data/ufoai-2.5/src/client/cl_irc.cpp:754:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, params);
data/ufoai-2.5/src/client/cl_irc.cpp:776:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, params);
data/ufoai-2.5/src/client/cl_irc.cpp:798:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, params);
data/ufoai-2.5/src/client/cl_irc.cpp:875:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buf, params);
data/ufoai-2.5/src/client/cl_irc.cpp:923:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(nick, prefix);
data/ufoai-2.5/src/client/cl_irc.cpp:934:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(response, trailing);
data/ufoai-2.5/src/client/cl_irc.cpp:940:32:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
			const size_t response_len = sprintf(response, IRC_CTCP_MARKER_STR "TIME :%s" IRC_CTCP_MARKER_STR, ctime(&t));
data/ufoai-2.5/src/client/input/cl_keys.cpp:282:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(keyLines[editLine] + keyLinePos - 1, keyLines[editLine] + keyLinePos);
data/ufoai-2.5/src/client/input/cl_keys.cpp:290:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(keyLines[editLine] + keyLinePos, keyLines[editLine] + keyLinePos + 1);
data/ufoai-2.5/src/client/renderer/r_program.cpp:294:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(*out, in);
data/ufoai-2.5/src/common/files.cpp:1218:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(strrchr(filename, '/') + 1, (const char*)fileList->data);
data/ufoai-2.5/src/common/files.cpp:1313:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
			strcpy(strrchr(filename, '/') + 1, (const char*)lFile->data);
data/ufoai-2.5/src/common/files.cpp:1624:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return (access(path, R_OK) == 0);
data/ufoai-2.5/src/common/mem.cpp:428:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(out, in);
data/ufoai-2.5/src/common/scripts.cpp:693:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char *) b, token);
data/ufoai-2.5/src/common/scripts.cpp:1050:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy((char *) b, (const char *) set);
data/ufoai-2.5/src/game/lua/liolib.cpp:275:7:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (fscanf(f, LUA_NUMBER_SCAN, &d) == 1) {
data/ufoai-2.5/src/game/lua/liolib.cpp:420:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          fprintf(f, LUA_NUMBER_FMT, lua_tonumber(L, arg)) > 0;
data/ufoai-2.5/src/game/lua/lobject.cpp:198:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(out, source);
data/ufoai-2.5/src/game/lua/lobject.cpp:210:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(out, source);
data/ufoai-2.5/src/game/lua/loslib.cpp:39:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  lua_pushinteger(L, system(luaL_optstring(L, 1, nullptr)));
data/ufoai-2.5/src/game/lua/lstrlib.cpp:750:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(form + l - 1, LUA_INTFRMLEN);
data/ufoai-2.5/src/game/lua/lstrlib.cpp:777:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          sprintf(buff, form, (int)luaL_checknumber(L, arg));
data/ufoai-2.5/src/game/lua/lstrlib.cpp:782:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          sprintf(buff, form, (LUA_INTFRM_T)luaL_checknumber(L, arg));
data/ufoai-2.5/src/game/lua/lstrlib.cpp:787:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          sprintf(buff, form, (unsigned LUA_INTFRM_T)luaL_checknumber(L, arg));
data/ufoai-2.5/src/game/lua/lstrlib.cpp:792:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          sprintf(buff, form, (double)luaL_checknumber(L, arg));
data/ufoai-2.5/src/game/lua/lstrlib.cpp:810:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(buff, form, s);
data/ufoai-2.5/src/game/lua/luaconf.h:524:29:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define lua_number2str(s,n)	sprintf((s), LUA_NUMBER_FMT, (n))
data/ufoai-2.5/src/game/lua/luaconf.h:671:53:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define lua_popen(L,c,m)	((void)L, fflush(nullptr), popen(c,m))
data/ufoai-2.5/src/game/lua/print.cpp:60:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(bvalue(o) ? "true" : "false");
data/ufoai-2.5/src/game/lua/print.cpp:63:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(LUA_NUMBER_FMT,nvalue(o));
data/ufoai-2.5/src/libs/picomodel/picointernal.c:160:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(cloned, str);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:234:2:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
	vsprintf(str, format, argptr);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:663:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(path, ext);
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:711:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
					strcpy(materialName, name);
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:822:8:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
							strcpy(mapname, name);
data/ufoai-2.5/src/ports/android/android_system.cpp:114:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(crash, BUILDSTRING ", cpu: " CPUSTRING ", version: " UFO_VERSION "\n\n");
data/ufoai-2.5/src/ports/unix/unix_main.cpp:254:2:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	fprintf(crash, BUILDSTRING ", cpu: " CPUSTRING ", version: " UFO_VERSION "\n\n");
data/ufoai-2.5/src/ports/unix/unix_shared.cpp:205:2:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	system(buf);
data/ufoai-2.5/src/ports/windows/win_backtrace.cpp:126:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
		fprintf(crash, BUILDSTRING ", cpu: " CPUSTRING ", version: " UFO_VERSION "\n\n");
data/ufoai-2.5/src/ports/windows/win_shared.cpp:472:2:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
	strcat(strcat(strcpy(str, name), "="), value);
data/ufoai-2.5/src/ports/windows/win_shared.cpp:472:16:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcat(strcat(strcpy(str, name), "="), value);
data/ufoai-2.5/src/ports/windows/win_shared.cpp:489:2:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	ShellExecute(NULL, "open", url, NULL, NULL, SW_SHOWNORMAL);
data/ufoai-2.5/src/shared/bfd.cpp:48:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(ob->buf + ob->ptr, ob->sz - ob->ptr, format, ap);
data/ufoai-2.5/src/shared/entitiesdef.cpp:54:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(lastErr, sizeof(lastErr), __VA_ARGS__); \
data/ufoai-2.5/src/shared/entitiesdef.cpp:64:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(lastErr, sizeof(lastErr), __VA_ARGS__); \
data/ufoai-2.5/src/shared/entitiesdef.cpp:86:3:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
		snprintf(lastErrExtra, sizeof(lastErr), __VA_ARGS__); \
data/ufoai-2.5/src/shared/shared.cpp:249:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(end, expectedFileName);
data/ufoai-2.5/src/shared/shared.cpp:552:8:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	len = vsnprintf(str, size, format, ap);
data/ufoai-2.5/src/shared/shared.h:68:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# ifndef snprintf
data/ufoai-2.5/src/shared/shared.h:69:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/ufoai-2.5/src/shared/shared.h:69:20:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#  define snprintf _snprintf
data/ufoai-2.5/src/tools/addr2line.cpp:73:2:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	vfprintf(stderr, format, args);
data/ufoai-2.5/src/tools/memory.cpp:29:24:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TYPESIZE(type) printf(STRUCTFORMAT ": " SIZEFORMAT " KB\n", #type, MEMORY_HumanReadable(sizeof(type)));
data/ufoai-2.5/src/tools/memory.cpp:53:2:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	snprintf(buf, sizeof(buf) - 1, UFO_SIZE_T "." UFO_SIZE_LENGTH_T "." UFO_SIZE_LENGTH_T, mb, kb, b);
data/ufoai-2.5/src/tools/memory.cpp:64:2:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
	printf(STRUCTFORMAT "     " SIZEFORMAT "\n\n", "struct", "size");
data/ufoai-2.5/src/tools/radiant/libs/os/file.h:32:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define access(path, mode) _access(path, mode)
data/ufoai-2.5/src/tools/radiant/libs/os/file.h:79:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
	return access(path.c_str(), static_cast<int> (mode)) == 0;
data/ufoai-2.5/src/tools/radiant/libs/string/string.h:280:2:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
	vsnprintf(text, size, msg.c_str(), ap);
data/ufoai-2.5/src/tools/radiant/libs/uniquenames.h:69:2:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
	strcpy(buffer, name.first.c_str());
data/ufoai-2.5/src/tools/radiant/radiant/url.cpp:31:9:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return ShellExecute((HWND)GDK_WINDOW_HWND (GTK_WIDGET(GlobalRadiant().getMainWindow())->window), "open", url, 0, 0, SW_SHOW) > (HINSTANCE)32;
data/ufoai-2.5/src/tools/radiant/radiant/url.cpp:39:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return (system(command) == 0);
data/ufoai-2.5/src/tools/radiant/radiant/url.cpp:46:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
	return (system(command) == 0);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:176:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ps->name, pObject->name);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:177:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ps->materialname, ase.materials[pObject->materialRef].name);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:454:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(u, s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:457:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(v, s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:460:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(w, s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:536:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
		strcpy(ase.objects[ase.currentObject].name, s_token + 1);
data/ufoai-2.5/src/tools/ufomodel/md2.cpp:57:3:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
		scanf(va("%%%is", MD2_MAX_SKINNAME), name);
data/ufoai-2.5/src/tools/ufomodel/md2.cpp:199:4:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
			scanf(va("%%%is", MD2_MAX_SKINNAME), name);
data/ufoai-2.5/src/client/cgame/campaign/cp_time.cpp:307:73:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	maxFrame.sec = std::max(minFrame.day * SECONDS_PER_DAY + minFrame.sec, random);
data/ufoai-2.5/src/common/common.cpp:1033:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(seed);
data/ufoai-2.5/src/common/scripts.cpp:2351:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int random, j;
data/ufoai-2.5/src/common/scripts.cpp:2368:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	for (j = 0; j < random; j++) {
data/ufoai-2.5/src/game/g_ai.cpp:1525:7:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		if (random <= 0.05f) {
data/ufoai-2.5/src/game/g_ai.cpp:1527:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		} else if (random <= 0.15f) {
data/ufoai-2.5/src/game/g_ai.cpp:1530:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		} else if (random <= 0.3f) {
data/ufoai-2.5/src/game/g_main.cpp:385:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(gi.seed);
data/ufoai-2.5/src/game/lua/lmathlib.cpp:210:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  srand(luaL_checkint(L, 1));
data/ufoai-2.5/src/game/lua/loadlib.cpp:595:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* path = getenv(envname);
data/ufoai-2.5/src/game/lua/loslib.cpp:69:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  lua_pushstring(L, getenv(luaL_checkstring(L, 1)));  /* if nullptr push nil */
data/ufoai-2.5/src/game/lua/luaconf.h:658:33:  [3] (tmpfile) tmpnam:
  Temporary file race condition (CWE-377).
#define lua_tmpnam(b,e)		{ e = (tmpnam(b) == nullptr); }
data/ufoai-2.5/src/ports/android/android_system.cpp:46:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	char * user = getenv("USER");
data/ufoai-2.5/src/ports/unix/unix_console.cpp:217:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	const char* term = getenv("TERM");
data/ufoai-2.5/src/ports/unix/unix_files.cpp:47:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	return getenv("HOME");
data/ufoai-2.5/src/ports/windows/win_shared.cpp:144:6:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
	if (getenv("LANGUAGE"))
data/ufoai-2.5/src/ports/windows/win_shared.cpp:145:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
		return getenv("LANGUAGE");
data/ufoai-2.5/src/ports/windows/win_shared.cpp:419:13:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	shfolder = LoadLibrary("shfolder.dll");
data/ufoai-2.5/src/server/sv_rma.cpp:501:6:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	int random;
data/ufoai-2.5/src/server/sv_rma.cpp:514:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	return tileSet->tiles[random];
data/ufoai-2.5/src/server/sv_rma.cpp:582:56:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		const Tile *tile = SV_GetMapTile(map, tileSet->tiles[random]);
data/ufoai-2.5/src/server/sv_rma.cpp:591:89:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			Com_Error(ERR_DROP, "Could not find tile: '%s' in tileset '%s' (%s)", tileSet->tiles[random], tileSet->id, filename);
data/ufoai-2.5/src/tests/test_campaign.cpp:814:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(1);
data/ufoai-2.5/src/tests/test_mapdef.cpp:152:7:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
						srand(i);
data/ufoai-2.5/src/tests/test_mapdef.cpp:330:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(seed);
data/ufoai-2.5/src/tests/test_mapdef.cpp:434:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(seed);
data/ufoai-2.5/src/tests/test_mapdef.cpp:476:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(seed);
data/ufoai-2.5/src/tests/test_rma.cpp:67:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(0);
data/ufoai-2.5/src/tests/test_rma.cpp:78:2:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
	srand(0);
data/ufoai-2.5/src/tests/test_rma.cpp:93:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(i);
data/ufoai-2.5/src/tests/test_rma.cpp:113:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(i);
data/ufoai-2.5/src/tests/test_rma.cpp:133:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(i);
data/ufoai-2.5/src/tests/test_rma.cpp:167:4:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
			srand(i);
data/ufoai-2.5/src/tests/test_rma.cpp:200:3:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
		srand(i);
data/ufoai-2.5/src/tools/radiant/radiant/environment.cpp:52:9:  [3] (buffer) g_get_home_dir:
  This function is synonymous with 'getenv("HOME")';it returns untrustable
  input if the environment can beset by an attacker. It can have any content
  and length, and the same variable can be set more than once (CWE-807,
  CWE-20). Check environment variables carefully before using them.
	home = g_get_home_dir();
data/ufoai-2.5/src/tools/radiant/radiant/main.cpp:363:8:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
	lib = LoadLibrary("dwmapi.dll");
data/ufoai-2.5/src/client/battlescape/cl_actor.cpp:1971:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		align = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/battlescape/cl_actor.cpp:2345:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int num = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/battlescape/cl_battlescape.cpp:369:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(CL_GetConfigString(index));
data/ufoai-2.5/src/client/battlescape/cl_battlescape.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_battlescape.h:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char configstrings[MAX_CONFIGSTRINGS][MAX_TOKEN_CHARS];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:272:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char text[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:370:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int selectedPopupIndex = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:419:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tuString[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[32];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char callback[32];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:592:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char callback[32];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:636:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const fireDefIndex_t firemode = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1094:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char topText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char bottomText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1109:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char leftText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1139:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char infoText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1176:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char mouseText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1207:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char infoText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1215:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char mouseText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1327:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char text[256];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1383:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tooltip[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_hud.cpp:1509:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int actorIdx = atoi(newValue);
data/ufoai-2.5/src/client/battlescape/cl_hud_callbacks.cpp:119:34:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const fireDefIndex_t firemode = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/battlescape/cl_hud_callbacks.cpp:334:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			int  const index = atoi(rest + 3);
data/ufoai-2.5/src/client/battlescape/cl_localentity.cpp:396:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char retAnim[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_localentity.h:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inlineModelName[8];	/**< for bmodels */
data/ufoai-2.5/src/client/battlescape/cl_localentity.h:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];				/**< in case this local model is referenced by some other local
data/ufoai-2.5/src/client/battlescape/cl_localentity.h:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];			/**< the name of the model file */
data/ufoai-2.5/src/client/battlescape/cl_localentity.h:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_localentity.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tagname[MAX_VAR];			/**< in case a tag should be used to place the model */
data/ufoai-2.5/src/client/battlescape/cl_localentity.h:211:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char animname[MAX_QPATH];		/**< is this an animated model */
data/ufoai-2.5/src/client/battlescape/cl_parse.cpp:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[1024];
data/ufoai-2.5/src/client/battlescape/cl_parse.cpp:187:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[MAX_SVC_DISCONNECT];
data/ufoai-2.5/src/client/battlescape/cl_parse.cpp:195:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[MAX_SVC_RECONNECT];
data/ufoai-2.5/src/client/battlescape/cl_parse.cpp:204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[MAX_SVC_PRINT];
data/ufoai-2.5/src/client/battlescape/cl_parse.cpp:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char s[MAX_SVC_STUFFTEXT];
data/ufoai-2.5/src/client/battlescape/cl_particle.cpp:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ptl[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_particle.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ptl[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_particle.cpp:1084:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keyname[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_particle.cpp:1236:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char baseComponentToken[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char classname[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char target[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char targetname[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tagname[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char anim[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char model[MAX_QPATH];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char particle[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/cl_spawn.cpp:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char noise[MAX_QPATH];
data/ufoai-2.5/src/client/battlescape/cl_view.cpp:124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char model[MAX_QPATH];
data/ufoai-2.5/src/client/battlescape/events/e_parse.cpp:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tbuf[32];
data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorappear.cpp:170:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char tmpbuf[128];
data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actordie.cpp:88:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmpbuf[128];
data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actordie.cpp:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char tmpbuf[128];
data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorrevitalised.cpp:66:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char tmpbuf[128];
data/ufoai-2.5/src/client/battlescape/events/event/actor/e_event_actorwound.cpp:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tmpbuf[128];
data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_explode.cpp:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sound[MAX_QPATH];
data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_particleappear.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char particle[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_particlespawn.cpp:52:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char particle[MAX_VAR];
data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_sound.cpp:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sound[MAX_QPATH];
data/ufoai-2.5/src/client/battlescape/events/event/world/e_event_sound.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sound[MAX_QPATH];
data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft.cpp:94:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int baseIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft.cpp:310:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(prevItemCargo, aircraft->itemcargo, sizeof(aircraft->itemcargo));
data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft.cpp:1657:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		max = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft.h:153:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];			/**< Aircraft name (user can change this). */
data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft_callbacks.cpp:69:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int i = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_aircraft_callbacks.cpp:165:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char aircraftInfo[256];
data/ufoai-2.5/src/client/cgame/campaign/cp_alien_interest.cpp:223:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int interest = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont_callbacks.cpp:47:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont_callbacks.cpp:80:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_aliencont_callbacks.cpp:108:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_base.cpp:968:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int baseIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base.cpp:1430:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buildingText[MAX_BUILDING_INFO_TEXT_LENGTH];
data/ufoai-2.5/src/client/cgame/campaign/cp_base.cpp:2082:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int baseIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base.cpp:2154:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int i = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base.cpp:2701:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buildingType[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_base.h:104:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];			/**< Name of the base */
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:58:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:107:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	baseID = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char baseName[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:561:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:669:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int baseID = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:670:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int buildingID = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:716:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int baseID = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:720:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char maps[2048];
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:721:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char coords[2048];
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:892:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char textInfoBuffer[1024];
data/ufoai-2.5/src/client/cgame/campaign/cp_base_callbacks.cpp:937:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int i = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:107:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	slotIDX = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:108:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	itemIDX = atoi(cgi->Cmd_Argv(3));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:143:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char defBuffer[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:329:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	slotIDX = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:421:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	slotIDX = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:488:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char type[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:499:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		baseIdx = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:598:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	base = B_GetBaseByIDX(atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:637:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	base = B_GetBaseByIDX(atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:675:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			BDEF_SetAutoFire(&base->batteries[i], atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:677:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			BDEF_SetAutoFire(&base->lasers[i], atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_basedefence_callbacks.cpp:680:50:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			BDEF_SetAutoFire(&installation->batteries[i], atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.cpp:1004:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.cpp:1030:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	base_t* base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.cpp:1032:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int count = atoi(cgi->Cmd_Argv(3));
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.cpp:1064:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	base_t* base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.cpp:1065:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int amount = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];			/**< id of the category */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:249:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];				/**< script id */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char onwin[MAX_VAR];			/**< trigger command after you've won a battle, @sa CP_ExecuteMissionTrigger */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:272:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char onlose[MAX_VAR];			/**< trigger command after you've lost a battle, @sa CP_ExecuteMissionTrigger */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char alienEquipment[MAX_VAR];		/**< Equipment of alien team */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:288:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char civTeam[MAX_VAR];				/**< Type of civilian (European, ...) */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:337:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];			/**< id of the campaign */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:338:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];			/**< name of the campaign */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char researched[MAX_VAR];	/**< name of the researched tech list to use on campaign start */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:341:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char soldierEquipment[MAX_VAR];	/**< name of the equipment list that is used to equip soldiers on crafts that are added to the first base */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char equipment[MAX_VAR];	/**< name of the equipment list to use on campaign start */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:343:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char market[MAX_VAR];		/**< name of the market list containing initial items on market */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char asymptoticMarket[MAX_VAR];		/**< name of the market list containing items on market at the end of the game */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:347:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[MAX_VAR];			/**< placeholder for gettext stuff */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:348:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char map[MAX_VAR];			/**< geoscape map */
data/ufoai-2.5/src/client/cgame/campaign/cp_campaign.h:362:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char firstBaseTemplate[MAX_VAR];	/**< template to use for setting up the first base */
data/ufoai-2.5/src/client/cgame/campaign/cp_cgame_callbacks.cpp:116:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char campaignDesc[MAXCAMPAIGNTEXT];
data/ufoai-2.5/src/client/cgame/campaign/cp_employee.cpp:522:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char teamDefName[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:99:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	employeeScrollPos = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:159:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	employeeCategory = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:164:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		hiredEmployeeIdx = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:273:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int num = employeeScrollPos + atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:323:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		num = atoi(arg + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:328:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		button = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_employee_callbacks.cpp:370:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:184:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:533:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dateBuf[MAX_VAR] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_event_callbacks.cpp:68:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	baseID = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp:307:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char smallbuffer1[256];
data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp:308:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char smallbuffer2[128];
data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp:580:55:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const aircraftItemType_t type = (aircraftItemType_t)atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp:624:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp:695:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	zone = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_fightequip_callbacks.cpp:898:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	techIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char popupText[2048];				/**< Text to display in popup_multi_selection menu */
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:91:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char textStandard[2048];		/**< Buffer to display standard text on the geoscape */
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:152:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		selected = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:995:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int idx = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:1441:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(path.point, aircraft->pos, sizeof(vec2_t));
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:1442:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(path.point + 1, aircraft->route.point + aircraft->point + 1, (path.numPoints - 1) * sizeof(vec2_t));
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:1554:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:1718:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[512] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_geoscape.cpp:1805:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			static char t[64];
data/ufoai-2.5/src/client/cgame/campaign/cp_hospital.cpp:162:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		amount = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.cpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char text[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.cpp:136:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int ucn = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.cpp:144:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int odIdx = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.cpp:165:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int odIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_hospital_callbacks.cpp:210:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int ucn = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_installation.cpp:293:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		idx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_installation.h:75:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];				/**< Name of the installation */
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:146:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	installationID = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:177:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (cgi->Cmd_Argc() < 2 || atoi(cgi->Cmd_Argv(1)) < 0) {
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:180:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		installation = INS_GetByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:182:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			Com_DPrintf(DEBUG_CLIENT, "Installation not founded (idx %i)\n", atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:188:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (cgi->Cmd_Argc() < 3 || !atoi(cgi->Cmd_Argv(2))) {
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:189:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char command[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:217:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (cgi->Cmd_Argc() < 2 || atoi(cgi->Cmd_Argv(1)) < 0) {
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:222:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ins = INS_GetByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_installation_callbacks.cpp:224:69:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			Com_DPrintf(DEBUG_CLIENT, "Installation not founded (idx %i)\n", atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:105:35:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ccs.eMarket.autosell[od->idx] = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:129:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	count = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:132:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(3)));
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:136:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int idx = atoi(rest);
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:150:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int ucn = atoi(rest);
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:298:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int idx = atoi(rest);
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:312:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int ucn = atoi(rest);
data/ufoai-2.5/src/client/cgame/campaign/cp_market_callbacks.cpp:365:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions.cpp:34:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char const* const nt_strings[NT_NUM_NOTIFYTYPE] = {
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions.cpp:168:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	MSO_Set(0, (notify_t)type, optionsType, atoi(cgi->Cmd_Argv(3)), false);
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions.cpp:183:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const bool activate = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions.h:110:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char const* const nt_strings[NT_NUM_NOTIFYTYPE];
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.cpp:92:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		idx = atoi(OPTIONEXTRADATACONST(option).value);
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.cpp:142:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		messageList_size = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.cpp:159:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int listIndex = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.cpp:171:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		idx = atoi(OPTIONEXTRADATA(iterator.option).value);
data/ufoai-2.5/src/client/cgame/campaign/cp_messageoptions_callbacks.cpp:212:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	messageList_scroll = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp:31:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char cp_messageBuffer[MAX_MESSAGE_TEXT];
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp:268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char title[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp:269:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char text[MAX_MESSAGE_TEXT];
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp:270:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char id[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp:311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char dateBuf[MAX_VAR] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timestamp[TIMESTAMP_TEXT];
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.h:76:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char cp_messageBuffer[MAX_MESSAGE_TEXT];
data/ufoai-2.5/src/client/cgame/campaign/cp_missions.cpp:120:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char maps[2048];
data/ufoai-2.5/src/client/cgame/campaign/cp_missions.cpp:121:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char coords[2048];
data/ufoai-2.5/src/client/cgame/campaign/cp_missions.cpp:1665:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		type = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_missions.cpp:1667:33:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	category = (interestCategory_t)atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_nation.cpp:483:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_nation.cpp:711:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	nat = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_nation.cpp:771:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[1024];
data/ufoai-2.5/src/client/cgame/campaign/cp_overlay.cpp:301:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(cgi->r_radarPic, cgi->r_radarSourcePic, RADAR_WIDTH * RADAR_HEIGHT);
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp:486:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];			/**< id of the campaign */
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp:487:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char amount[MAX_VAR];			/**< placeholder for gettext stuff */
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp:488:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char numbercrash[MAX_VAR];			/**< geoscape map */
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp:565:45:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					comp->itemAmount[comp->numItemtypes] = atoi(itemTokens.amount);
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp:570:47:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						comp->itemAmount2[comp->numItemtypes] = atoi(itemTokens.numbercrash);
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.cpp:583:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			comp->time = atoi(token);
data/ufoai-2.5/src/client/cgame/campaign/cp_parse.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char assemblyId[MAX_VAR];	/**< The name of the assembly (i.e. the UFO) */
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char textPopup[POPUP_AIRCRAFT_MAX_TEXT];	/**< Text displayed in popup_aircraft */
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:117:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char text[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:178:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	selectedPopupIndex = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:262:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:335:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char aircraftListText[256] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:385:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char aircraftListText[256] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:456:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:535:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_popup.cpp:621:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char msg[1024];
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:257:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char productionInfo[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:289:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char productionInfo[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:324:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char productionInfo[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:412:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:479:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:623:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		amount = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:746:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		amount = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_produce_callbacks.cpp:783:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	amount = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_radar.cpp:291:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	baseIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp:1371:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							requiredTemp->links[requiredTemp->numLinks].amount = atoi(amountToken);
data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp:1386:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							requiredTemp->links[requiredTemp->numLinks].amount = atoi(token);
data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp:1418:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							requiredTemp->links[requiredTemp->numLinks].amount = atoi(amountToken);
data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp:1444:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							requiredTemp->links[requiredTemp->numLinks].amount = atoi(amountToken);
data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp:1455:61:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
							requiredTemp->links[requiredTemp->numLinks].amount = atoi(token);
data/ufoai-2.5/src/client/cgame/campaign/cp_research_callbacks.cpp:91:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int diff = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gameVersion[16];		/**< game version that was used to save this file */
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];				/**< savefile name */
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gameDate[32];			/**< internal game date */
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char realDate[32];			/**< real datestring when the user saved this game */
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:251:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char savegame[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy[2];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:259:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[30];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timeStampBuffer[32];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:331:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fbuf, &header, sizeof(header));
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:344:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(fbuf + sizeof(header), buf, requiredBufferLength);
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:374:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char comment[MAX_VAR] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:400:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:447:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int idx = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:472:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:545:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:38:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char statsBuffer[MAX_STATS_BUFFER];
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:54:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ucn = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:99:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ucn = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:137:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ucn = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char typeId[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:213:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		aircraft = AIR_AircraftGetFromIDX(atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:215:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			Com_Printf("No aircraft exist with global idx %i\n", atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:270:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int idx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:363:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int ucn = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_team_callbacks.cpp:364:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int bodySkinIdx = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_time.cpp:58:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[6];
data/ufoai-2.5/src/client/cgame/campaign/cp_time.cpp:222:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	CP_SetGameTime(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer.cpp:142:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char message[256];
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer.cpp:294:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		transIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[1024];
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char str[128];
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:334:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[128];
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:340:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[128];
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char itemId[MAX_VAR * 2];
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:437:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int amount = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:441:49:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		aircraft_t* aircraft = AIR_AircraftGetFromIDX(atoi(itemId + 9));
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:452:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Employee* employee = E_GetEmployeeFromChrUCN(atoi(itemId + 4));
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:693:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	baseIdx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_transfer_callbacks.cpp:866:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	base_t* base = B_GetFoundedBaseByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_ufo.cpp:792:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char detectedBy[MAX_VAR] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:47:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char upBuffer[MAX_UPTEXT];
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:228:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char itemText[1024];
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:386:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char itemText[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:475:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char mailHeader[8 * MAX_VAR] = ""; /* bigger as techMail_t (utf8) */
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:476:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dateBuf[MAX_VAR] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:871:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int techId = atoi(cgi->Cmd_Argv(1) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:900:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:946:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1033:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char headline[256] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1034:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char dateBuf[64] = "";
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery.cpp:418:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ufoId[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery.cpp:430:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	installationIDX = atoi(cgi->Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery.cpp:467:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int idx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ufoID[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:131:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char cap[MAX_VAR];
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:177:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	idx = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:215:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char row[512];
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:440:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:536:57:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (cgi->Cmd_Argc() < 2 || (ufo = US_GetStoredUFOByIDX(atoi(cgi->Cmd_Argv(1)))) == nullptr) {
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:566:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	storedUFO_t* ufo = US_GetStoredUFOByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:568:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Com_DPrintf(DEBUG_CLIENT, "Stored UFO with idx: %i does not exist\n", atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:573:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if (cgi->Cmd_Argc() < 3 || !atoi(cgi->Cmd_Argv(2))) {
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:574:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char command[128];
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:597:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	storedUFO_t* ufo = US_GetStoredUFOByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:599:73:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Com_DPrintf(DEBUG_CLIENT, "Stored UFO with idx: %i does not exist\n", atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:624:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	installation_t* ins = INS_GetByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:626:75:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Com_DPrintf(DEBUG_CLIENT, "Installation with idx: %i does not exist\n", atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:650:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ufo = US_GetStoredUFOByIDX(atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:652:53:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Com_Printf("Stored ufo with idx %i not found.\n", atoi(cgi->Cmd_Argv(1)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:655:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	ins = INS_GetByIDX(atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/cp_uforecovery_callbacks.cpp:657:60:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Com_Printf("Installation with idx: %i does not exist\n", atoi(cgi->Cmd_Argv(2)));
data/ufoai-2.5/src/client/cgame/campaign/missions/cp_mission_baseattack.cpp:174:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char popupText[1024];
data/ufoai-2.5/src/client/cgame/cgame.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];		/**< the id is also the file basename */
data/ufoai-2.5/src/client/cgame/cgame.h:85:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char window[MAX_VAR];	/**< the ui window id where this game type should become active for */
data/ufoai-2.5/src/client/cgame/cgame.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];		/**< translatable ui name */
data/ufoai-2.5/src/client/cgame/cl_game.cpp:331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4096];
data/ufoai-2.5/src/client/cgame/cl_game.cpp:354:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4096];
data/ufoai-2.5/src/client/cgame/cl_game.cpp:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[4096];
data/ufoai-2.5/src/client/cgame/cl_game.cpp:1123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fullPath[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024]; \
data/ufoai-2.5/src/client/cgame/cl_game.h:107:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024]; \
data/ufoai-2.5/src/client/cgame/cl_game.h:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024]; \
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32]; /**< savefile name */
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:90:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int ucn = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:91:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int value = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:132:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:147:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char relSavePath[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:149:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pattern[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:173:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char absSavePath[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:226:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dummy[2];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:265:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fbuf, &header, sizeof(header));
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:266:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(fbuf + sizeof(header), buf, requiredBufferLength + 1);
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:427:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:429:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pattern[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:455:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:476:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int index = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:478:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/client/cgame/cl_game_team.cpp:547:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int ucn = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/multiplayer/cl_game_multiplayer.cpp:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/ufoai-2.5/src/client/cgame/multiplayer/cl_game_multiplayer.cpp:202:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char message[2048];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.cpp:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server[MAX_VAR];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.cpp:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serverport[16];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.cpp:96:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char commandBuf[8];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.cpp:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paramBuf[2048];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_callbacks.cpp:218:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char buf[MAX_VAR];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char serverText[1024];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:123:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[512];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:141:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char paramBuf[2048];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[4096];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:264:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char serverInfoText[1024];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:265:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char userInfoText[256];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_INFO_STRING];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:341:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		const int team = atoi(token);
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:367:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[8];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:370:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char hostname[256];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:389:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	int num = atoi(token);
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:401:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char node[MAX_VAR];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:409:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char service[MAX_VAR];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:422:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char node[MAX_VAR];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char service[MAX_VAR];
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.cpp:505:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int num = atoi(cgi->Cmd_Argv(1));
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sv_hostname[MAX_OSPATH];	/**< the server hostname */
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapname[16];				/**< currently running map */
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.h:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char version[8];				/**< the game version */
data/ufoai-2.5/src/client/cgame/multiplayer/mp_serverlist.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gametype[8];				/**< the game type */
data/ufoai-2.5/src/client/cgame/skirmish/cl_game_skirmish.cpp:144:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cvarBuf[MAX_VAR];
data/ufoai-2.5/src/client/cgame/skirmish/cl_game_skirmish.cpp:184:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char resultText[1024];
data/ufoai-2.5/src/client/cinematic/cl_cinematic.cpp:73:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[MAX_QPATH];
data/ufoai-2.5/src/client/cinematic/cl_cinematic.cpp:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_OSPATH];
data/ufoai-2.5/src/client/cinematic/cl_cinematic.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			name[MAX_QPATH];	/**< virtual filesystem path with file suffix */
data/ufoai-2.5/src/client/cinematic/cl_cinematic_ogm.cpp:522:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char streamtype[8];
data/ufoai-2.5/src/client/cinematic/cl_cinematic_ogm.cpp:523:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subtype[4];
data/ufoai-2.5/src/client/cinematic/cl_cinematic_roq.cpp:402:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ROQCIN.frameBuffer[1], ROQCIN.frameBuffer[0], sizeof(*ROQCIN.frameBuffer[1]) * ROQCIN.frameWidth * ROQCIN.frameHeight);
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[MAX_DATA_LENGTH];
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];	/**< the name of the sequence (script id) */
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char parent[MAX_VAR];	/**< in case this is a child model (should get placed onto a tag of the parent) */
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tag[MAX_VAR];		/**< the tag to place this model onto */
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:99:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];		/**< the script id for this object */
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:101:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char font[MAX_VAR];		/**< the font to use in case this is a text object */
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char image[MAX_VAR];	/**< the image to render */
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:595:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	context->animspeed = atoi(name);
data/ufoai-2.5/src/client/cl_console.cpp:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAXCMDLINE];
data/ufoai-2.5/src/client/cl_console.cpp:460:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char consoleMessage[128];
data/ufoai-2.5/src/client/cl_http.cpp:124:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(p, "%%%02x", filePath[i]);
data/ufoai-2.5/src/client/cl_http.cpp:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char escapedFilePath[MAX_QPATH * 4];
data/ufoai-2.5/src/client/cl_http.cpp:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tempFile[MAX_OSPATH];
data/ufoai-2.5/src/client/cl_http.cpp:164:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
		strcat(dl->filePath, ".tmp");
data/ufoai-2.5/src/client/cl_http.cpp:169:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		dl->file = fopen(dl->filePath, "wb");
data/ufoai-2.5/src/client/cl_http.cpp:317:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char listPath[MAX_OSPATH];
data/ufoai-2.5/src/client/cl_http.cpp:351:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char lastfilename[MAX_OSPATH] = "";
data/ufoai-2.5/src/client/cl_http.cpp:461:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char gamePath[MAX_OSPATH];
data/ufoai-2.5/src/client/cl_http.cpp:464:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			f = fopen(gamePath, "rb");
data/ufoai-2.5/src/client/cl_http.cpp:589:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempName[MAX_OSPATH];
data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp:67:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char itemText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp:316:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		changeTab = atoi(Cmd_Argv(3)) >= 1;
data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp:318:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int num = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp:381:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	if ((Cmd_Argc() == 2 || atoi(Cmd_Argv(2)) == 0) && count > 0)
data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp:384:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[MAX_VAR];
data/ufoai-2.5/src/client/cl_inventory_callbacks.cpp:385:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tooltip[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char topic[256];
data/ufoai-2.5/src/client/cl_irc.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char string[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:254:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char prefix[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char params[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char trailing[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:266:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char irc_buffer[4096];
data/ufoai-2.5/src/client/cl_irc.cpp:313:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nick, mask, length);
data/ufoai-2.5/src/client/cl_irc.cpp:391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:403:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:414:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:425:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:436:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:470:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:483:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:515:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:526:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:539:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:552:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:563:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:574:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:585:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[IRC_RECV_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:630:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char appendString[2048];
data/ufoai-2.5/src/client/cl_irc.cpp:662:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:701:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:726:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:748:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:770:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:792:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:826:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:834:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:843:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:852:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:861:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:870:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:871:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:893:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:916:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:921:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(nick, prefix, emph - prefix);
data/ufoai-2.5/src/client/cl_irc.cpp:933:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char response[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:939:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char response[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:948:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char serverIPAndPort[128];
data/ufoai-2.5/src/client/cl_irc.cpp:999:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nick[MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:1242:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char command[4];
data/ufoai-2.5/src/client/cl_irc.cpp:1252:37:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			msg->id.numeric = (irc_numeric_t)atoi(command);
data/ufoai-2.5/src/client/cl_irc.cpp:1329:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(m->msg, msg, msg_len);
data/ufoai-2.5/src/client/cl_irc.cpp:1683:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cropped_msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:1697:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(cropped_msg, msg + 1, msg_len - 2);
data/ufoai-2.5/src/client/cl_irc.cpp:1714:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char cropped_msg[IRC_SEND_BUF_SIZE];
data/ufoai-2.5/src/client/cl_irc.cpp:1719:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(cropped_msg, msg + 1, msg_len - 2);
data/ufoai-2.5/src/client/cl_irc.cpp:1750:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char buf[1024];
data/ufoai-2.5/src/client/cl_irc.cpp:1777:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char irc_userListOrdered[IRC_MAX_USERLIST][MAX_VAR];
data/ufoai-2.5/src/client/cl_irc.cpp:1826:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/ufoai-2.5/src/client/cl_irc.cpp:1913:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/cl_irc.cpp:1939:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/cl_language.cpp:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char languagePath[MAX_OSPATH];
data/ufoai-2.5/src/client/cl_language.cpp:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char systemLanguage[MAX_VAR];
data/ufoai-2.5/src/client/cl_main.cpp:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char info[MAX_INFO_STRING];
data/ufoai-2.5/src/client/cl_main.cpp:315:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_STRING_TOKENS];
data/ufoai-2.5/src/client/cl_main.cpp:342:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[512];
data/ufoai-2.5/src/client/cl_main.cpp:379:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char str[512];
data/ufoai-2.5/src/client/cl_main.cpp:467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING];
data/ufoai-2.5/src/client/cl_main.cpp:501:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/cl_main.cpp:502:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base[MAX_QPATH];
data/ufoai-2.5/src/client/cl_main.cpp:1012:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING];
data/ufoai-2.5/src/client/cl_main.cpp:1208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char languagePath[MAX_OSPATH];
data/ufoai-2.5/src/client/cl_renderer.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];	/**< script id of the particle */
data/ufoai-2.5/src/client/cl_renderer.h:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];	/**< the path of the particle art - must be the first entry because the parsing code relies on this */
data/ufoai-2.5/src/client/cl_screen.cpp:65:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cursorImage[MAX_QPATH];
data/ufoai-2.5/src/client/cl_team.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/cl_tutorials.cpp:31:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/cl_tutorials.cpp:32:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char sequence[MAX_VAR];
data/ufoai-2.5/src/client/cl_tutorials.cpp:69:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int num = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/client.h:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char servername[MAX_VAR];		/**< name of server from original connect */
data/ufoai-2.5/src/client/client.h:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char serverport[16];			/**< port the server is running at */
data/ufoai-2.5/src/client/client.h:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char downloadName[MAX_OSPATH];
data/ufoai-2.5/src/client/client.h:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char downloadServer[512];	/**< base url prefix to download from */
data/ufoai-2.5/src/client/client.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char downloadReferer[32];	/**< libcurl requires a static string :( */
data/ufoai-2.5/src/client/input/cl_input.cpp:123:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		k = atoi(c);
data/ufoai-2.5/src/client/input/cl_input.cpp:147:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	b->downtime = atoi(c);
data/ufoai-2.5/src/client/input/cl_input.cpp:170:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		k = atoi(c);
data/ufoai-2.5/src/client/input/cl_input.cpp:195:11:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	uptime = atoi(c);
data/ufoai-2.5/src/client/input/cl_keys.cpp:37:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char keyLines[MAXKEYLINES][MAXCMDLINE];
data/ufoai-2.5/src/client/input/cl_keys.cpp:46:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char msgBuffer[MAXCMDLINE];
data/ufoai-2.5/src/client/input/cl_keys.cpp:486:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tinystr[2];
data/ufoai-2.5/src/client/input/cl_keys.cpp:740:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/client/input/cl_keys.h:189:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char msgBuffer[MAXCMDLINE];
data/ufoai-2.5/src/client/input/cl_keys.h:191:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char keyLines[MAXKEYLINES][MAXCMDLINE];
data/ufoai-2.5/src/client/renderer/r_bsp.cpp:184:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&r_state.vertex_array_3d[k], vertex, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_bsp.cpp:185:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&r_state.vertex_array_3d[k + 3], end, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_corona.cpp:70:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&r_state.color_array[0], c->color, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_corona.cpp:76:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&r_state.vertex_array_3d[0], c->org, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_corona.cpp:86:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&r_state.vertex_array_3d[vertind], v, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_draw.cpp:119:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_char_arrays.colors[r_char_arrays.color_index +  0], &color, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:120:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_char_arrays.colors[r_char_arrays.color_index +  4], &color, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:121:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_char_arrays.colors[r_char_arrays.color_index +  8], &color, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:122:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_char_arrays.colors[r_char_arrays.color_index + 12], &color, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:204:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_fill_arrays.colors[r_fill_arrays.color_index +  0], &c, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:205:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_fill_arrays.colors[r_fill_arrays.color_index +  4], &c, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:206:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_fill_arrays.colors[r_fill_arrays.color_index +  8], &c, 4);
data/ufoai-2.5/src/client/renderer/r_draw.cpp:207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(&r_fill_arrays.colors[r_fill_arrays.color_index + 12], &c, 4);
data/ufoai-2.5/src/client/renderer/r_entity.cpp:587:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(t->matrix, mc, sizeof(float) * 16);
data/ufoai-2.5/src/client/renderer/r_flare.cpp:171:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&r_state.color_array[j], f->color, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_flare.cpp:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&texunit_diffuse.texcoord_array[k], default_texcoords, sizeof(vec2_t) * 4);
data/ufoai-2.5/src/client/renderer/r_flare.cpp:181:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(&r_state.vertex_array_3d[l], verts, sizeof(vec3_t) * 4);
data/ufoai-2.5/src/client/renderer/r_font.cpp:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[MAX_CACHE_STRING];	/**< hash id */
data/ufoai-2.5/src/client/renderer/r_font.cpp:95:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char truncmarker[MAX_TRUNCMARKER] =  "...";
data/ufoai-2.5/src/client/renderer/r_font.cpp:357:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUF_SIZE];
data/ufoai-2.5/src/client/renderer/r_font.cpp:393:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUF_SIZE];
data/ufoai-2.5/src/client/renderer/r_font.cpp:576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[BUF_SIZE];
data/ufoai-2.5/src/client/renderer/r_font.cpp:606:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buf, &text[chunk->pos], chunk->len);
data/ufoai-2.5/src/client/renderer/r_font.cpp:668:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(texunit_diffuse.texcoord_array, font_texcoords, sizeof(font_texcoords));
data/ufoai-2.5/src/client/renderer/r_image.cpp:154:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filenameTemp[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_image.cpp:167:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(*pic, surf->pixels, size);
data/ufoai-2.5/src/client/renderer/r_image.cpp:360:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(out, in, size);
data/ufoai-2.5/src/client/renderer/r_image.cpp:379:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(in, out, size);
data/ufoai-2.5/src/client/renderer/r_image.cpp:565:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lname[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_image.cpp:645:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_image.h:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];				/**< game path, including extension, must be first */
data/ufoai-2.5/src/client/renderer/r_local.h:178:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lodDir[8];
data/ufoai-2.5/src/client/renderer/r_main.cpp:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[4096];
data/ufoai-2.5/src/client/renderer/r_main.cpp:738:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char targetBuf[128];
data/ufoai-2.5/src/client/renderer/r_main.cpp:773:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char targetBuf[128];
data/ufoai-2.5/src/client/renderer/r_material.cpp:379:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&r_state.normal_array[i * 3], n, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_material.cpp:383:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&r_state.tangent_array[i * 4], t, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_material.cpp:532:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_material.cpp:606:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(c);
data/ufoai-2.5/src/client/renderer/r_material.cpp:831:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			s->anim.num_frames = atoi(c);
data/ufoai-2.5/src/client/renderer/r_material.cpp:866:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			i = atoi(c);
data/ufoai-2.5/src/client/renderer/r_material.cpp:944:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_mesh.cpp:569:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&colorArray[0], &color[j], 4);
data/ufoai-2.5/src/client/renderer/r_mesh.cpp:570:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&colorArray[4], &color[j], 4);
data/ufoai-2.5/src/client/renderer/r_misc.cpp:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	checkName[MAX_OSPATH];
data/ufoai-2.5/src/client/renderer/r_misc.cpp:135:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			quality = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/renderer/r_misc.cpp:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[1024] = "";
data/ufoai-2.5/src/client/renderer/r_misc.cpp:316:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(s, "enabled, ");
data/ufoai-2.5/src/client/renderer/r_misc.cpp:318:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(s, "with texcoord array, ");
data/ufoai-2.5/src/client/renderer/r_misc.cpp:320:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(s, "active, ");
data/ufoai-2.5/src/client/renderer/r_misc.cpp:322:4:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
			strcat(s, "client active, ");
data/ufoai-2.5/src/client/renderer/r_model.cpp:119:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char animname[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model.cpp:220:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model.cpp:275:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		i = atoi(name + 1) - 1;
data/ufoai-2.5/src/client/renderer/r_model.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];	/**< path relative to base/ */
data/ufoai-2.5/src/client/renderer/r_model_alias.cpp:78:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		anim->from = atoi(token);
data/ufoai-2.5/src/client/renderer/r_model_alias.cpp:89:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		anim->to = atoi(token);
data/ufoai-2.5/src/client/renderer/r_model_alias.cpp:238:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mdxFileName[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_alias.cpp:524:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_alias.h:84:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MODEL_MAX_PATH];
data/ufoai-2.5/src/client/renderer/r_model_alias.h:90:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[MODEL_MAX_PATH];
data/ufoai-2.5/src/client/renderer/r_model_alias.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[MODEL_MAX_PATH];
data/ufoai-2.5/src/client/renderer/r_model_alias.h:133:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_ANIMNAME];	/**< the name of this animation from the anm file */
data/ufoai-2.5/src/client/renderer/r_model_alias.h:140:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:64:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(r_worldmodel->bsp.lightdata, mod_base + l->fileofs, l->filelen);
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:188:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:617:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&mod->bsp.normals[vertOfs], normal, sizeof(vec3_t));
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:621:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(&mod->bsp.tangents[tangOfs], tangent, sizeof(vec4_t));
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:1124:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:1125:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_brush.cpp:1169:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				sh[i] = atoi(token);
data/ufoai-2.5/src/client/renderer/r_model_md2.cpp:460:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_md2.cpp:469:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char fileName[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_md2.cpp:497:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tagname[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_md3.cpp:104:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(pouttag->name, pintag->name, MD3_MAX_PATH);
data/ufoai-2.5/src/client/renderer/r_model_md3.cpp:121:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(poutmesh->name, pinmesh->name, MD3_MAX_PATH);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(&mesh->texcoords[coordind + j * 2], &obj->texcoords[(v->texcoord - 1) * 2], sizeof(vec2_t));
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tok[32];
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:177:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					v->vert = atoi(tok);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:179:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					v->texcoord = atoi(tok);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:181:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					v->normal = atoi(tok);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:195:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			v->vert = atoi(tok);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:197:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			v->texcoord = atoi(tok);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:199:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			v->normal = atoi(tok);
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char skinPath[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_model_obj.cpp:331:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[MAX_STRING_CHARS];
data/ufoai-2.5/src/client/renderer/r_program.cpp:480:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char path[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_program.cpp:601:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_QPATH], *src[1];
data/ufoai-2.5/src/client/renderer/r_program.cpp:611:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char log[MAX_STRING_CHARS];
data/ufoai-2.5/src/client/renderer/r_program.cpp:673:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char log[MAX_STRING_CHARS];
data/ufoai-2.5/src/client/renderer/r_program.cpp:734:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char log[MAX_STRING_CHARS];
data/ufoai-2.5/src/client/renderer/r_program.h:30:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_program.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/client/renderer/r_program.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/renderer/r_sdl.cpp:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char videoDriverName[MAX_VAR] = "";
data/ufoai-2.5/src/client/renderer/r_sdl.cpp:144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[4096] = "";
data/ufoai-2.5/src/client/sound/s_main.cpp:160:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char pattern[MAX_OSPATH];
data/ufoai-2.5/src/client/sound/s_main.cpp:243:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char drivername[MAX_VAR];
data/ufoai-2.5/src/client/sound/s_mumble.cpp:91:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char context[256];
data/ufoai-2.5/src/client/sound/s_music.cpp:49:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char currentTrack[MAX_QPATH];
data/ufoai-2.5/src/client/sound/s_music.cpp:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char nextTrack[MAX_QPATH];
data/ufoai-2.5/src/client/sound/s_music.cpp:135:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/client/sound/s_music.cpp:388:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream, userdata->sampleBuf + userdata->mixerPos, length);
data/ufoai-2.5/src/client/sound/s_music.cpp:394:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream, userdata->sampleBuf + userdata->mixerPos, end);
data/ufoai-2.5/src/client/sound/s_music.cpp:395:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(stream, userdata->sampleBuf, start);
data/ufoai-2.5/src/client/sound/s_sample.cpp:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/client/ui/node/ui_node_abstractnode.cpp:282:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int ms = atoi(msStr);
data/ufoai-2.5/src/client/ui/node/ui_node_baseinventory.cpp:598:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tooltiptext[MAX_VAR * 2];
data/ufoai-2.5/src/client/ui/node/ui_node_container.cpp:455:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(color, colorLoadable, sizeof(vec4_t));
data/ufoai-2.5/src/client/ui/node/ui_node_container.cpp:457:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(color, colorDefault, sizeof(vec4_t));
data/ufoai-2.5/src/client/ui/node/ui_node_container.cpp:660:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char tooltiptext[MAX_VAR * 2];
data/ufoai-2.5/src/client/ui/node/ui_node_editor.cpp:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tab[16];
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:294:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char stageName[MAX_VAR] = "stage ";
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:436:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	id = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:465:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		stageID = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:500:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	id = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:508:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	stageID = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:528:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	id = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:536:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	stageID = atoi(Cmd_Argv(2));
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:562:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	id = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/ui/node/ui_node_messagelist.cpp:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_messagelist.cpp:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char timestamp[TIMESTAMP_TEXT];
data/ufoai-2.5/src/client/ui/node/ui_node_model.cpp:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char source[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_model.cpp:323:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		mi.skin = atoi(UI_GetReferenceString(node, EXTRADATA(node).skin));
data/ufoai-2.5/src/client/ui/node/ui_node_model.cpp:369:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char childSource[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_model.cpp:401:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				mi.skin = atoi(UI_GetReferenceString(child, EXTRADATA(child).skin));
data/ufoai-2.5/src/client/ui/node/ui_node_option.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char label[MAX_VAR];	/**< text for the select box */
data/ufoai-2.5/src/client/ui/node/ui_node_option.h:46:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[MAX_VAR];	/**< the value the cvar should get */
data/ufoai-2.5/src/client/ui/node/ui_node_radar.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base[MAX_QPATH];		/**< the base path in case of a random map assembly */
data/ufoai-2.5/src/client/ui/node/ui_node_radar.cpp:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_radar.cpp:145:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sh[i] = atoi(token);
data/ufoai-2.5/src/client/ui/node/ui_node_radar.cpp:290:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char imagePath[MAX_QPATH];
data/ufoai-2.5/src/client/ui/node/ui_node_string.cpp:110:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tooltiptext[256];
data/ufoai-2.5/src/client/ui/node/ui_node_text.cpp:158:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char textCopy[UI_TEXTNODE_BUFFERSIZE];
data/ufoai-2.5/src/client/ui/node/ui_node_text.cpp:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newFont[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_text2.cpp:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newFont[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp:67:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cvarValueBackup[MAX_CVAR_EDITING_LENGTH];
data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_CVAR_EDITING_LENGTH];
data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp:197:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MAX_CVAR_EDITING_LENGTH];
data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp:313:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char  buf[MAX_VAR];
data/ufoai-2.5/src/client/ui/node/ui_node_todo.cpp:46:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tooltiptext[1024];
data/ufoai-2.5/src/client/ui/ui_actions.cpp:209:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char cmd[256];
data/ufoai-2.5/src/client/ui/ui_actions.cpp:211:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char propertyName[256];
data/ufoai-2.5/src/client/ui/ui_draw.cpp:49:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char noticeText[256];
data/ufoai-2.5/src/client/ui/ui_input.cpp:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newPath[256];
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:169:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char result[512];
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:209:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:588:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newNode, node, UI_Node_GetMemorySize(node));
data/ufoai-2.5/src/client/ui/ui_nodes.h:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];			/**< name from the script files */
data/ufoai-2.5/src/client/ui/ui_popup.cpp:37:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char popupText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/ui/ui_popup.cpp:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char popupAction1[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/ui/ui_popup.cpp:39:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char popupAction2[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/ui/ui_popup.cpp:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char popupAction3[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/ui/ui_popup.h:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char popupText[UI_MAX_SMALLTEXTLEN];
data/ufoai-2.5/src/client/ui/ui_sprite.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char basePicNameBuf[MAX_QPATH];
data/ufoai-2.5/src/client/ui/ui_sprite.cpp:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char picNameBuf[MAX_QPATH];
data/ufoai-2.5/src/client/ui/ui_sprite.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/client/ui/ui_tooltip.cpp:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[MAX_VAR];
data/ufoai-2.5/src/client/web/web_cgame.cpp:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char categoryStr[MAX_VAR];
data/ufoai-2.5/src/client/web/web_cgame.cpp:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char userIdStr[MAX_VAR];
data/ufoai-2.5/src/client/web/web_cgame.cpp:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char encoded[256] = { '\0' };
data/ufoai-2.5/src/client/web/web_cgame.cpp:83:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf1[URL_SIZE];
data/ufoai-2.5/src/client/web/web_cgame.cpp:126:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[URL_SIZE];
data/ufoai-2.5/src/client/web/web_cgame.cpp:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[URL_SIZE];
data/ufoai-2.5/src/client/web/web_cgame.cpp:169:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char idBuf[MAX_VAR];
data/ufoai-2.5/src/client/web/web_cgame.cpp:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[URL_SIZE];
data/ufoai-2.5/src/client/web/web_cgame.cpp:192:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_OSPATH];
data/ufoai-2.5/src/client/web/web_cgame.cpp:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char file[MAX_QPATH];
data/ufoai-2.5/src/client/web/web_cgame.cpp:232:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char name[MAX_VAR];
data/ufoai-2.5/src/client/web/web_cgame.cpp:266:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char idBuf[MAX_VAR];
data/ufoai-2.5/src/client/web/web_cgame.cpp:317:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[URL_SIZE];
data/ufoai-2.5/src/client/web/web_cgame.cpp:343:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int category = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/web/web_cgame.cpp:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/client/web/web_cgame.cpp:361:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int category = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/web/web_cgame.cpp:377:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int category = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/web/web_cgame.cpp:379:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int userId = Cmd_Argc() == 4 ? atoi(Cmd_Argv(3)) : -1;
data/ufoai-2.5/src/client/web/web_cgame.cpp:394:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int category = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/client/web/web_cgame.cpp:395:39:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int userId = Cmd_Argc() == 3 ? atoi(Cmd_Argv(2)) : -1;
data/ufoai-2.5/src/client/web/web_main.cpp:47:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[576];
data/ufoai-2.5/src/client/web/web_main.cpp:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char passwordEncoded[512];
data/ufoai-2.5/src/client/web/web_main.cpp:50:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char usernameEncoded[128];
data/ufoai-2.5/src/client/web/web_main.cpp:68:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[576];
data/ufoai-2.5/src/client/web/web_main.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char passwordEncoded[MAX_VAR];
data/ufoai-2.5/src/client/web/web_main.cpp:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char usernameEncoded[MAX_VAR];
data/ufoai-2.5/src/client/web/web_main.cpp:124:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		Cvar_Set("web_userid", "%i", atoi(response));
data/ufoai-2.5/src/client/web/web_main.cpp:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char digest[41];
data/ufoai-2.5/src/client/web/web_main.cpp:139:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char user[MAX_VAR];
data/ufoai-2.5/src/client/web/web_main.cpp:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char combined[512];
data/ufoai-2.5/src/common/binaryexpressionparser.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char varName[MAX_VAR];
data/ufoai-2.5/src/common/bsp.cpp:630:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char keyname[256];
data/ufoai-2.5/src/common/bsp.cpp:657:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				int num = atoi(token + 1);
data/ufoai-2.5/src/common/bsp.cpp:690:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(tile.lightdata, base + l->fileofs, l->filelen);
data/ufoai-2.5/src/common/bsp.cpp:788:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/common/bsp.cpp:932:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/common/bsp.cpp:933:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char base[MAX_QPATH];
data/ufoai-2.5/src/common/bsp.cpp:977:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				sh[i] = atoi(token);
data/ufoai-2.5/src/common/bsp.cpp:1011:8:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	num = atoi(name + 1) - 1;
data/ufoai-2.5/src/common/bspslicer.cpp:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/common/cmd.cpp:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_ALIAS_NAME];
data/ufoai-2.5/src/common/cmd.cpp:101:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char defer_text_buf[CMD_BUFFER_SIZE];
data/ufoai-2.5/src/common/cmd.cpp:126:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char text[CMD_BUFFER_SIZE];
data/ufoai-2.5/src/common/cmd.cpp:166:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(temp, cmd_text.data, templen);
data/ufoai-2.5/src/common/cmd.cpp:191:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(defer_text_buf, cmd_text_buf, cmd_text.cursize);
data/ufoai-2.5/src/common/cmd.cpp:215:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char line[1024];
data/ufoai-2.5/src/common/cmd.cpp:238:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(line, text, i);
data/ufoai-2.5/src/common/cmd.cpp:370:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(f2, f, len);
data/ufoai-2.5/src/common/cmd.cpp:399:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmd[MAX_STRING_CHARS];
data/ufoai-2.5/src/common/cmd.cpp:499:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char cmd_args[MAX_STRING_CHARS];
data/ufoai-2.5/src/common/cmd.cpp:634:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char searchName[MAX_VAR];
data/ufoai-2.5/src/common/cmd.cpp:656:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char matchString[MAX_QPATH];
data/ufoai-2.5/src/common/cmd.cpp:916:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/common/common.cpp:340:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[MAXPRINTMSG];
data/ufoai-2.5/src/common/common.cpp:372:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char timestamp[40];
data/ufoai-2.5/src/common/common.cpp:420:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char msg[MAXPRINTMSG];
data/ufoai-2.5/src/common/common.cpp:612:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char expanded[MAX_STRING_CHARS];
data/ufoai-2.5/src/common/common.cpp:747:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdLine[MAXCMDLINE] = "";
data/ufoai-2.5/src/common/common.cpp:748:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char cmdBase[MAXCMDLINE] = "";
data/ufoai-2.5/src/common/common.cpp:798:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		static char cmdBackup[MAX_QPATH];
data/ufoai-2.5/src/common/common.cpp:1039:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[9];
data/ufoai-2.5/src/common/common.cpp:1055:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[37];
data/ufoai-2.5/src/common/common.cpp:1076:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/common/common.cpp:1297:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MAX_STRING_CHARS] = { "" };
data/ufoai-2.5/src/common/cvar.cpp:387:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	var->integer = atoi(var->string);
data/ufoai-2.5/src/common/cvar.cpp:570:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				var->integer = atoi(var->string);
data/ufoai-2.5/src/common/cvar.cpp:598:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	var->integer = atoi(var->string);
data/ufoai-2.5/src/common/cvar.cpp:627:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[512];
data/ufoai-2.5/src/common/cvar.cpp:672:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	var->integer = atoi(var->string);
data/ufoai-2.5/src/common/cvar.cpp:706:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		var->integer = atoi(var->string);
data/ufoai-2.5/src/common/cvar.cpp:1056:26:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	value = cvar->integer % atoi(Cmd_Argv(2));
data/ufoai-2.5/src/common/cvar.cpp:1089:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		var->integer = atoi(var->string);
data/ufoai-2.5/src/common/files.cpp:120:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pathCopy[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:167:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netpath[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:178:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		file->f = fopen(netpath, (mode == FILE_WRITE ? "wb" : "ab"));
data/ufoai-2.5/src/common/files.cpp:230:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			file->f = fopen(netpath, "rb");
data/ufoai-2.5/src/common/files.cpp:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:442:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filenameInZip[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:508:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pakfile_list[MAX_PACKFILES][MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:510:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pattern[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:577:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tempList[MAX_FILES][MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:672:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gdir[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:687:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gdir[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:748:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:814:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char findname[1024];
data/ufoai-2.5/src/common/files.cpp:933:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char path[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:958:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:994:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char files[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:995:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char findname[1024];
data/ufoai-2.5/src/common/files.cpp:1052:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char pathName[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1053:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
						char pathNameEntry[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1230:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char lastList[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1235:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char headerType[MAX_VAR];
data/ufoai-2.5/src/common/files.cpp:1236:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char headerName[512];
data/ufoai-2.5/src/common/files.cpp:1303:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char filename[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1401:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char findname[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:1402:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/common/files.cpp:1529:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[1024];
data/ufoai-2.5/src/common/files.cpp:1601:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:1614:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:1694:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(fromOSPath, "rb");
data/ufoai-2.5/src/common/files.cpp:1709:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(toOSPath, "wb");
data/ufoai-2.5/src/common/files.cpp:1744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char from_buf[MAX_OSPATH];
data/ufoai-2.5/src/common/files.cpp:1745:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char to_buf[MAX_OSPATH];
data/ufoai-2.5/src/common/filesys.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_OSPATH];
data/ufoai-2.5/src/common/filesys.h:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/common/filesys.h:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/common/filesys.h:102:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/common/http.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/ufoai-2.5/src/common/http.cpp:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char headerBuff[1024];
data/ufoai-2.5/src/common/http.cpp:124:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dl->tempBuffer, tmp, dl->fileSize);
data/ufoai-2.5/src/common/http.cpp:129:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dl->tempBuffer + dl->position, ptr, bytes);
data/ufoai-2.5/src/common/http.cpp:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server[512];
data/ufoai-2.5/src/common/http.cpp:146:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipServer[MAX_VAR];
data/ufoai-2.5/src/common/http.cpp:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uriPath[512];
data/ufoai-2.5/src/common/http.cpp:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[576];
data/ufoai-2.5/src/common/http.cpp:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[576];
data/ufoai-2.5/src/common/http.h:42:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char				ufoPath[MAX_QPATH];
data/ufoai-2.5/src/common/http.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		filePath[MAX_OSPATH];
data/ufoai-2.5/src/common/http.h:54:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		URL[576];
data/ufoai-2.5/src/common/ioapi.cpp:47:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(filename, mode_fopen);
data/ufoai-2.5/src/common/list.cpp:59:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	void*         const dataCopy = memcpy(Mem_PoolAllocTypeN(byte, length, com_genericPool), data, length);
data/ufoai-2.5/src/common/md4.cpp:132:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char buf[128];
data/ufoai-2.5/src/common/md4.cpp:142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(buf, in, n);
data/ufoai-2.5/src/common/md5.cpp:29:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char in[64];
data/ufoai-2.5/src/common/md5.cpp:186:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(p, buf, len);
data/ufoai-2.5/src/common/md5.cpp:189:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(p, buf, t);
data/ufoai-2.5/src/common/md5.cpp:198:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ctx->in, buf, 64);
data/ufoai-2.5/src/common/md5.cpp:207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(ctx->in, buf, len);
data/ufoai-2.5/src/common/md5.cpp:253:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(digest, ctx->buf, 16);
data/ufoai-2.5/src/common/md5.cpp:276:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[2048];
data/ufoai-2.5/src/common/md5.cpp:289:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[16] = { "" };
data/ufoai-2.5/src/common/md5.cpp:292:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char final[33];
data/ufoai-2.5/src/common/md5.cpp:315:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char digest[16] = { "" };
data/ufoai-2.5/src/common/md5.cpp:318:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char final[33];
data/ufoai-2.5/src/common/mem.cpp:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MEM_MAX_POOLNAME]; /**< Name of pool */
data/ufoai-2.5/src/common/mem.cpp:368:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newPtr, ptr, std::min(mem->memSize, size));
data/ufoai-2.5/src/common/mem.cpp:411:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(copy, in, size);
data/ufoai-2.5/src/common/msg.cpp:56:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(SZ_GetSpace(buf, length), data, length);
data/ufoai-2.5/src/common/net.cpp:287:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ufoai-2.5/src/common/net.cpp:496:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[4096];
data/ufoai-2.5/src/common/net.cpp:527:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[4096];
data/ufoai-2.5/src/common/net.cpp:577:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[256];
data/ufoai-2.5/src/common/net.cpp:578:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char addrbuf[256];
data/ufoai-2.5/src/common/net.cpp:801:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/ufoai-2.5/src/common/net.cpp:876:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char node[64];
data/ufoai-2.5/src/common/net.cpp:895:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[128];
data/ufoai-2.5/src/common/net.cpp:900:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[64];
data/ufoai-2.5/src/common/net.cpp:901:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char service[64];
data/ufoai-2.5/src/common/net.cpp:1158:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dgram->msg, buf, len);
data/ufoai-2.5/src/common/net.cpp:1159:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dgram->addr, to, len);
data/ufoai-2.5/src/common/netpack.cpp:556:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[256];
data/ufoai-2.5/src/common/netpack.cpp:576:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/ufoai-2.5/src/common/netpack.cpp:595:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tmp[256];
data/ufoai-2.5/src/common/qfiles.h:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];				/**< frame name from grabbing */
data/ufoai-2.5/src/common/qfiles.h:189:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char creator[16];
data/ufoai-2.5/src/common/qfiles.h:198:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MD3_MAX_PATH];		/**< tag name */
data/ufoai-2.5/src/common/qfiles.h:203:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MD3_MAX_PATH];
data/ufoai-2.5/src/common/qfiles.h:208:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[4];
data/ufoai-2.5/src/common/qfiles.h:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MD3_MAX_PATH];
data/ufoai-2.5/src/common/qfiles.h:231:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MD3_MAX_PATH];
data/ufoai-2.5/src/common/routing.cpp:979:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	signed char bases[UNIT_SIZE / PATHFINDING_MICROSTEP_SIZE + 1];
data/ufoai-2.5/src/common/routing.cpp:1467:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH], ext[MAX_OSPATH];
data/ufoai-2.5/src/common/routing.cpp:1473:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ext, ".%i.elevation.csv", i);
data/ufoai-2.5/src/common/routing.cpp:1499:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(ext, ".%i.walls.csv", i);
data/ufoai-2.5/src/common/scripts.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_CONSTNAMEINT_NAME];	/**< script id */
data/ufoai-2.5/src/common/scripts.cpp:438:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char parseErrorMessage[256];
data/ufoai-2.5/src/common/scripts.cpp:1075:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b, set, 64);
data/ufoai-2.5/src/common/scripts.cpp:1083:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(b, set, sizeof(date_t));
data/ufoai-2.5/src/common/scripts.cpp:1100:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char valuestr[MAX_VAR];
data/ufoai-2.5/src/common/scripts.cpp:1415:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *const skillNames[SKILL_NUM_TYPES + 1] = {
data/ufoai-2.5/src/common/scripts.cpp:1763:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				ad[i] = atoi(token);
data/ufoai-2.5/src/common/scripts.cpp:2160:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char *const name_strings[NAME_NUM_TYPES] = {
data/ufoai-2.5/src/common/scripts.cpp:2234:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					n = atoi(amountToken);
data/ufoai-2.5/src/common/scripts.cpp:2257:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				n = atoi(amountToken);
data/ufoai-2.5/src/common/scripts.cpp:2617:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		model.bodySkin = atoi(bodySkinToken);
data/ufoai-2.5/src/common/scripts.cpp:2618:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		model.headSkin = atoi(headSkinToken);
data/ufoai-2.5/src/common/scripts.cpp:2981:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *const penaltyNames[MODIFIER_MAX] = {
data/ufoai-2.5/src/common/sha1.cpp:333:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Com_SHA1File (const char* filename, char digest[41])
data/ufoai-2.5/src/common/sha1.cpp:361:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Com_SHA1Buffer (const unsigned char* buf, unsigned int len, char digest[41])
data/ufoai-2.5/src/common/sha1.h:49:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char Message_Block[64]; /* 512-bit message blocks */
data/ufoai-2.5/src/common/sha1.h:63:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Com_SHA1File (const char *filename, char digest[41]);
data/ufoai-2.5/src/common/sha1.h:63:42:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Com_SHA1File (const char *filename, char digest[41]);
data/ufoai-2.5/src/common/sha1.h:64:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Com_SHA1Buffer (const unsigned char *buf, unsigned int len, char digest[41]);
data/ufoai-2.5/src/common/sha1.h:64:66:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
bool Com_SHA1Buffer (const unsigned char *buf, unsigned int len, char digest[41]);
data/ufoai-2.5/src/common/sha2.cpp:223:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*) (ctx->buffer + left), (const void*) input, fill);
data/ufoai-2.5/src/common/sha2.cpp:237:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy((void*) (ctx->buffer + left), (const void*) input, length);
data/ufoai-2.5/src/common/sha2.cpp:302:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Com_SHA2ToHex (const byte digest[32], char final[65])
data/ufoai-2.5/src/common/sha2.h:34:44:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
void Com_SHA2ToHex (const byte digest[32], char final[65]);
data/ufoai-2.5/src/common/unzip.cpp:784:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szCurrentFileName[UNZ_MAXFILENAMEINZIP+1];
data/ufoai-2.5/src/common/unzip.cpp:970:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char source[12];
data/ufoai-2.5/src/common/xml.cpp:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char txt[50];
data/ufoai-2.5/src/common/xml.cpp:124:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char txt[50];
data/ufoai-2.5/src/common/xml.cpp:207:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char txt[50];
data/ufoai-2.5/src/common/xml.cpp:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char txt[50];
data/ufoai-2.5/src/common/xml.cpp:319:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(txt);
data/ufoai-2.5/src/common/xml.cpp:334:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(txt);
data/ufoai-2.5/src/common/xml.cpp:349:9:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atol(txt);
data/ufoai-2.5/src/game/chr_shared.cpp:263:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char returnModel[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.cpp:285:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char returnModel[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];					/** short name of the template */
data/ufoai-2.5/src/game/chr_shared.h:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char weapon[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:240:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char armour[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:242:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char actors[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:261:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_TEXPATH];
data/ufoai-2.5/src/game/chr_shared.h:262:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_TEXPATH];
data/ufoai-2.5/src/game/chr_shared.h:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char _id[MAX_TEXPATH];
data/ufoai-2.5/src/game/chr_shared.h:293:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];						/**< id from script file. */
data/ufoai-2.5/src/game/chr_shared.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];	/**< id from script file. */
data/ufoai-2.5/src/game/chr_shared.h:301:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];	/**< Translatable name. */
data/ufoai-2.5/src/game/chr_shared.h:302:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tech[MAX_VAR];	/**< technology_t id from research.ufo */
data/ufoai-2.5/src/game/chr_shared.h:303:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char footstepSound[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:333:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char hitParticle[MAX_VAR]; /**< Particle id of what particle effect should be spawned if a unit of this type is hit. */
data/ufoai-2.5/src/game/chr_shared.h:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char deathTextureName[MAX_VAR];	/**< texture name for death of any member of this team */
data/ufoai-2.5/src/game/chr_shared.h:370:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];			/**< Character name (as in: soldier name). */
data/ufoai-2.5/src/game/chr_shared.h:371:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:372:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char body[MAX_VAR];
data/ufoai-2.5/src/game/chr_shared.h:373:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char head[MAX_VAR];
data/ufoai-2.5/src/game/g_ai_lua.cpp:275:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_VAR];
data/ufoai-2.5/src/game/g_ai_lua.cpp:463:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(p, pos, sizeof(*p));
data/ufoai-2.5/src/game/g_ai_lua.cpp:475:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[MAX_VAR];
data/ufoai-2.5/src/game/g_ai_lua.cpp:998:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_VAR];
data/ufoai-2.5/src/game/g_cmds.cpp:39:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char smallBuf[64];
data/ufoai-2.5/src/game/g_cmds.cpp:40:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char largeBuf[1280];
data/ufoai-2.5/src/game/g_cmds.cpp:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[256];
data/ufoai-2.5/src/game/g_cmds.cpp:144:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		teamToKill = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_cmds.cpp:146:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			amount = atoi(gi.Cmd_Argv(2));
data/ufoai-2.5/src/game/g_cmds.cpp:182:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		teamToKill = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_cmds.cpp:212:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		team = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_cmds.cpp:332:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_cmds.cpp:360:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_cmds.cpp:386:6:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	i = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_cmds.cpp:407:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int entnum = atoi(gi.Cmd_Argv(1));
data/ufoai-2.5/src/game/g_edicts.cpp:134:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(duplicate, edict, sizeof(*edict));
data/ufoai-2.5/src/game/g_func.cpp:171:43:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	GET_SLIDING_DOOR_SHIFT_VECTOR(door->dir, open ? 1 : -1, moveAngles);
data/ufoai-2.5/src/game/g_local.h:83:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapname[MAX_QPATH];	/**< the server name (base1, etc) */
data/ufoai-2.5/src/game/g_local.h:307:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char type[MAX_QPATH];	/**< Lua file used by the AI. */
data/ufoai-2.5/src/game/g_local.h:308:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char subtype[MAX_VAR];	/**< Subtype to be used by AI. */
data/ufoai-2.5/src/game/g_main.cpp:268:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		logstatsfile = fopen(va("%s/stats.log", gi.FS_Gamedir()), "a");
data/ufoai-2.5/src/game/g_main.cpp:422:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/game/g_main.cpp:434:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/game/g_main.cpp:446:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/game/g_reaction.cpp:873:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msgHdr[100];
data/ufoai-2.5/src/game/g_spawn.cpp:250:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char keyname[MAX_VAR];
data/ufoai-2.5/src/game/g_svcmds.cpp:70:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char num[128];
data/ufoai-2.5/src/game/g_svcmds.cpp:92:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		b[i] = atoi(num);
data/ufoai-2.5/src/game/g_svcmds.cpp:212:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_OSPATH];
data/ufoai-2.5/src/game/g_svcmds.cpp:220:6:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	f = fopen(name, "wb");
data/ufoai-2.5/src/game/g_svcmds.cpp:249:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	team = atoi(gi.Cmd_Argv(2));
data/ufoai-2.5/src/game/g_svcmds.cpp:271:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	team = atoi(gi.Cmd_Argv(2));
data/ufoai-2.5/src/game/g_svcmds.cpp:331:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[128];
data/ufoai-2.5/src/game/g_trigger.cpp:137:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char command[MAX_VAR];
data/ufoai-2.5/src/game/g_utils.cpp:311:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[512];
data/ufoai-2.5/src/game/g_utils.cpp:321:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char tbuf[32];
data/ufoai-2.5/src/game/g_utils.cpp:344:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[512];
data/ufoai-2.5/src/game/game.h:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char userinfo[MAX_INFO_STRING];
data/ufoai-2.5/src/game/game.h:78:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char netname[16];
data/ufoai-2.5/src/game/inv_shared.h:379:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];	/**< id from script files. */
data/ufoai-2.5/src/game/inv_shared.h:610:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];			/**< script id of the equipment definition */
data/ufoai-2.5/src/game/inv_shared.h:625:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];
data/ufoai-2.5/src/game/lua/lauxlib.cpp:459:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(B->p, s, vl);  /* put it there */
data/ufoai-2.5/src/game/lua/lauxlib.cpp:525:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[LUAL_BUFFERSIZE];
data/ufoai-2.5/src/game/lua/lauxlib.cpp:564:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    lf.f = fopen(filename, "r");
data/ufoai-2.5/src/game/lua/lauxlib.h:133:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[LUAL_BUFFERSIZE];
data/ufoai-2.5/src/game/lua/ldblib.cpp:285:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[5];
data/ufoai-2.5/src/game/lua/ldblib.cpp:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[250];
data/ufoai-2.5/src/game/lua/ldebug.cpp:610:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buff[LUA_IDSIZE];  /* add file:line information */
data/ufoai-2.5/src/game/lua/ldump.cpp:145:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char h[LUAC_HEADERSIZE];
data/ufoai-2.5/src/game/lua/liolib.cpp:165:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  *pf = fopen(filename, mode);
data/ufoai-2.5/src/game/lua/liolib.cpp:185:9:  [2] (tmpfile) tmpfile:
  Function tmpfile() has a security flaw on some systems (e.g., older System
  V systems) (CWE-377).
  *pf = tmpfile();
data/ufoai-2.5/src/game/lua/liolib.cpp:205:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      *pf = fopen(filename, mode);
data/ufoai-2.5/src/game/lua/liolib.cpp:257:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    *pf = fopen(filename, "r");
data/ufoai-2.5/src/game/lua/llex.cpp:103:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[MAXSRC];
data/ufoai-2.5/src/game/lua/loadlib.cpp:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[MAX_PATH + 1];
data/ufoai-2.5/src/game/lua/loadlib.cpp:115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/ufoai-2.5/src/game/lua/loadlib.cpp:334:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *f = fopen(filename, "r");  /* try to open file */
data/ufoai-2.5/src/game/lua/lobject.cpp:127:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[2];
data/ufoai-2.5/src/game/lua/lobject.cpp:144:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[4*sizeof(void*) + 8]; /* should be enough space for a `%p' */
data/ufoai-2.5/src/game/lua/lobject.cpp:145:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buff, "%p", va_arg(argp, void*));
data/ufoai-2.5/src/game/lua/lobject.cpp:154:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[3];
data/ufoai-2.5/src/game/lua/lobject.cpp:196:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(out, "...");
data/ufoai-2.5/src/game/lua/lobject.cpp:204:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(out, "[string \"");
data/ufoai-2.5/src/game/lua/lobject.cpp:207:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(out, "...");
data/ufoai-2.5/src/game/lua/lobject.cpp:211:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(out, "\"]");
data/ufoai-2.5/src/game/lua/loslib.cpp:58:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buff[LUA_TMPNAMBUFSIZE];
data/ufoai-2.5/src/game/lua/loslib.cpp:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cc[3];
data/ufoai-2.5/src/game/lua/loslib.cpp:158:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buff[200];  /* should be big enough for any conversion result */
data/ufoai-2.5/src/game/lua/lstring.cpp:62:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(ts+1, str, l*sizeof(char));
data/ufoai-2.5/src/game/lua/lstrlib.cpp:770:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char form[MAX_FORMAT];  /* to store the format (`%...') */
data/ufoai-2.5/src/game/lua/lstrlib.cpp:771:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buff[MAX_ITEM];  /* to store the formatted item */
data/ufoai-2.5/src/game/lua/lua.h:356:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char short_src[LUA_IDSIZE]; /* (S) */
data/ufoai-2.5/src/game/lua/luaconf.h:651:2:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
	strcpy(b, "/tmp/lua_XXXXXX"); \
data/ufoai-2.5/src/game/lua/luaconf.h:652:6:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
	e = mkstemp(b); \
data/ufoai-2.5/src/game/lua/lundump.cpp:186:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char h[LUAC_HEADERSIZE];
data/ufoai-2.5/src/game/lua/lundump.cpp:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
 char s[LUAC_HEADERSIZE];
data/ufoai-2.5/src/game/lua/lundump.cpp:218:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
 memcpy(h,LUA_SIGNATURE,sizeof(LUA_SIGNATURE)-1);
data/ufoai-2.5/src/game/lua/lvm.cpp:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[LUAI_MAXNUMBER2STR];
data/ufoai-2.5/src/game/lua/lvm.cpp:306:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer+tl, svalue(top-i), l);
data/ufoai-2.5/src/game/lua/lzio.cpp:64:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(b, z->p, m);
data/ufoai-2.5/src/game/q_shared.h:329:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];
data/ufoai-2.5/src/game/q_shared.h:330:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[MAX_VAR];
data/ufoai-2.5/src/game/q_shared.h:334:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];	/**< script id */
data/ufoai-2.5/src/game/q_shared.h:335:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_VAR];	/**< translated menu name */
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:53:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t name[256];
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:58:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t identity[256];
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:60:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	unsigned char context[256];
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:61:2:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	wchar_t description[2048];
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:95:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char file[256];
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:156:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(lm->context, context, len);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char c[4];
data/ufoai-2.5/src/libs/picomodel/picointernal.c:128:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(ptr2, *ptr, oldSize);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:223:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[4096];
data/ufoai-2.5/src/libs/picomodel/picointernal.c:943:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*out = atoi(token);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:962:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	*out = atoi(token);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:1207:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(buffer, s->curPos, len);
data/ufoai-2.5/src/libs/picomodel/picomodel.c:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char surfaceName[64];
data/ufoai-2.5/src/libs/picomodel/picomodel.c:433:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(surfaceName, "Unnamed_%d", model->numSurfaces);
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:316:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lastNodeName[1024] = "";
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:633:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char materialName[1024];
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:80:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16]; /* frame name from grabbing */
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:204:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char skinname[MD2_MAX_SKINNAME];
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:311:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char path[MD2_MAX_SKINNAME];
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:312:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char skinnameRelative[MD2_MAX_SKINNAME];
data/ufoai-2.5/src/libs/picomodel/pm_md3.c:53:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char creator[16];
data/ufoai-2.5/src/libs/picomodel/pm_md3.c:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4];
data/ufoai-2.5/src/libs/picomodel/pm_md3.c:59:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64]; /* polyset name */
data/ufoai-2.5/src/libs/picomodel/pm_md3.c:73:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64];
data/ufoai-2.5/src/libs/picomodel/pm_md3.c:92:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char magic[4]; /* MD3_MAGIC */
data/ufoai-2.5/src/libs/picomodel/pm_md3.c:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[64]; /* model name */
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:597:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
				strcpy(p->token, "default");
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:703:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
					iv[i] = atoi(str);
data/ufoai-2.5/src/ports/android/android_system.cpp:60:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[1024];
data/ufoai-2.5/src/ports/android/android_system.cpp:109:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(dumpFile, "w");
data/ufoai-2.5/src/ports/macosx/osx_main.cpp:43:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char path[MAXPATHLEN];
data/ufoai-2.5/src/ports/unix/unix_console.cpp:36:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		buffer[256];
data/ufoai-2.5/src/ports/unix/unix_console.cpp:275:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char text[256];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:54:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char	findbase[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:55:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char	findpath[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static	char	findpattern[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:62:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fn[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:155:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char search[MAX_OSPATH], newsubdirs[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:156:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:199:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char cwd[MAX_OSPATH];
data/ufoai-2.5/src/ports/unix/unix_files.cpp:231:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	fifo = fopen(ospath, "w+");
data/ufoai-2.5/src/ports/unix/unix_main.cpp:61:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char s_userName[MAX_VAR];
data/ufoai-2.5/src/ports/unix/unix_main.cpp:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char string[1024];
data/ufoai-2.5/src/ports/unix/unix_main.cpp:155:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char g_output[BUFFER_MAX];
data/ufoai-2.5/src/ports/unix/unix_main.cpp:202:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		addr = (char *)buffer[x] - (char *)match.base;
data/ufoai-2.5/src/ports/unix/unix_main.cpp:243:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *file = fopen(dumpFile, "w");
data/ufoai-2.5/src/ports/unix/unix_shared.cpp:199:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[512];
data/ufoai-2.5/src/ports/windows/win_backtrace.cpp:22:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char procname[MAX_PATH];
data/ufoai-2.5/src/ports/windows/win_backtrace.cpp:27:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char symbol_buffer[sizeof(IMAGEHLP_SYMBOL) + 255];
data/ufoai-2.5/src/ports/windows/win_backtrace.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char module_name_raw[MAX_PATH];
data/ufoai-2.5/src/ports/windows/win_backtrace.cpp:119:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	crash = fopen(dumpFile, "w");
data/ufoai-2.5/src/ports/windows/win_console.cpp:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		cmdBuffer[MAXCMDLINE];	/**< Buffered input from dedicated console */
data/ufoai-2.5/src/ports/windows/win_console.cpp:94:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buffer[MAXCMDLINE];
data/ufoai-2.5/src/ports/windows/win_console.cpp:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[MAX_PRINTMSG];
data/ufoai-2.5/src/ports/windows/win_console.cpp:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/ports/windows/win_main.cpp:77:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char curDir[MAX_PATH];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:151:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char findbase[MAX_OSPATH];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:152:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char findpath[MAX_OSPATH];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char search[MAX_OSPATH], newsubdirs[MAX_OSPATH];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:256:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_OSPATH];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:351:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:369:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char s_userName[1024];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:383:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char cwd[MAX_OSPATH];
data/ufoai-2.5/src/ports/windows/win_shared.cpp:416:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char path[MAX_PATH];
data/ufoai-2.5/src/server/server.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];		/**< map name */
data/ufoai-2.5/src/server/server.h:110:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char assembly[MAX_QPATH];	/**< random map assembly name */
data/ufoai-2.5/src/server/server.h:117:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char configstrings[MAX_CONFIGSTRINGS][MAX_TOKEN_CHARS];
data/ufoai-2.5/src/server/server.h:157:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char userinfo[MAX_INFO_STRING];
data/ufoai-2.5/src/server/server.h:159:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[32];				/**< extracted from userinfo, high bits masked */
data/ufoai-2.5/src/server/server.h:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char peername[256];
data/ufoai-2.5/src/server/sv_ccmds.cpp:72:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		int idnum = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/server/sv_ccmds.cpp:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expanded[MAX_QPATH];
data/ufoai-2.5/src/server/sv_ccmds.cpp:166:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bufMap[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/server/sv_ccmds.cpp:168:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bufAssembly[MAX_TOKEN_CHARS * MAX_TILESTRINGS] = "";
data/ufoai-2.5/src/server/sv_ccmds.cpp:237:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ufoai-2.5/src/server/sv_ccmds.cpp:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char        state_buf[16];
data/ufoai-2.5/src/server/sv_ccmds.cpp:271:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(state_buf, "%7i", cl->state);
data/ufoai-2.5/src/server/sv_ccmds.cpp:290:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/server/sv_ccmds.cpp:319:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING];
data/ufoai-2.5/src/server/sv_ccmds.cpp:392:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char dayNightMatch[7];
data/ufoai-2.5/src/server/sv_game.cpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[1024];
data/ufoai-2.5/src/server/sv_game.cpp:82:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[1024];
data/ufoai-2.5/src/server/sv_game.cpp:165:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char val[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/server/sv_game.cpp:613:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_OSPATH];
data/ufoai-2.5/src/server/sv_log.cpp:63:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[1024];
data/ufoai-2.5/src/server/sv_main.cpp:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[64];
data/ufoai-2.5/src/server/sv_main.cpp:87:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(SV_GetConfigString(index));
data/ufoai-2.5/src/server/sv_main.cpp:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char node[64];
data/ufoai-2.5/src/server/sv_main.cpp:313:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char infoGlobal[MAX_INFO_STRING] = "";
data/ufoai-2.5/src/server/sv_main.cpp:327:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char infoPlayer[MAX_INFO_STRING] = "";
data/ufoai-2.5/src/server/sv_main.cpp:363:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING];
data/ufoai-2.5/src/server/sv_main.cpp:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char player[1024];
data/ufoai-2.5/src/server/sv_main.cpp:406:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int version = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/server/sv_main.cpp:408:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char string[MAX_VAR];
data/ufoai-2.5/src/server/sv_main.cpp:421:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char infostring[MAX_INFO_STRING];
data/ufoai-2.5/src/server/sv_main.cpp:449:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[256];
data/ufoai-2.5/src/server/sv_main.cpp:452:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	const int version = atoi(Cmd_Argv(1));
data/ufoai-2.5/src/server/sv_main.cpp:459:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char userinfo[MAX_INFO_STRING];
data/ufoai-2.5/src/server/sv_main.cpp:564:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[64];
data/ufoai-2.5/src/server/sv_main.cpp:587:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char sv_outputbuf[1024];
data/ufoai-2.5/src/server/sv_main.cpp:594:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char remaining[1024] = "";
data/ufoai-2.5/src/server/sv_main.cpp:617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char s[512];
data/ufoai-2.5/src/server/sv_main.cpp:636:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buf[256];
data/ufoai-2.5/src/server/sv_main.cpp:677:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char url[512];
data/ufoai-2.5/src/server/sv_mapcycle.cpp:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char expanded[MAX_QPATH];
data/ufoai-2.5/src/server/sv_mapcycle.cpp:38:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char assembly[MAX_QPATH];
data/ufoai-2.5/src/server/sv_mapcycle.cpp:203:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char map[MAX_VAR], gameType[MAX_VAR];
data/ufoai-2.5/src/server/sv_rma.cpp:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char screen[(MMH + 1) * ACH][(MMW + 1) * ACW];
data/ufoai-2.5/src/server/sv_rma.cpp:199:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char flags[33] = {0,};
data/ufoai-2.5/src/server/sv_rma.cpp:251:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char flags2[33] = {0,};
data/ufoai-2.5/src/server/sv_rma.cpp:404:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	target->w = atoi(token);
data/ufoai-2.5/src/server/sv_rma.cpp:409:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	target->h = atoi(token);
data/ufoai-2.5/src/server/sv_rma.cpp:545:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			a->seeds[a->numSeeds++] = atoi(token);
data/ufoai-2.5/src/server/sv_rma.cpp:1443:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapStr[10000] = {0};
data/ufoai-2.5/src/server/sv_rma.cpp:1444:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char posStr[10000] = {0};
data/ufoai-2.5/src/server/sv_rma.cpp:1606:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapStr[10000] = {0};
data/ufoai-2.5/src/server/sv_rma.cpp:1607:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char posStr[10000] = {0};
data/ufoai-2.5/src/server/sv_rma.cpp:1799:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(maps[i], map, sizeof(*map));
data/ufoai-2.5/src/server/sv_rma.cpp:1824:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(maps[i], map, sizeof(*map));
data/ufoai-2.5/src/server/sv_rma.cpp:1839:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(map, maps[i], sizeof(*map));
data/ufoai-2.5/src/server/sv_rma.cpp:1869:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/server/sv_rma.h:48:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];	/**< The id (string) of the tile as defined in the ump file (next to "tile"). */
data/ufoai-2.5/src/server/sv_rma.h:57:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];
data/ufoai-2.5/src/server/sv_rma.h:58:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char tiles[MAX_TILESETTILES][MAX_VAR];
data/ufoai-2.5/src/server/sv_rma.h:71:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char id[MAX_VAR];			/**< The id (string) of the assembly as defined in the ump file (next to "assembly"). */
data/ufoai-2.5/src/server/sv_rma.h:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char title[MAX_VAR];		/**< The full title for this assembly. This string should be marked as translatable (_). */
data/ufoai-2.5/src/server/sv_rma.h:116:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/server/sv_rma.h:137:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char basePath[MAX_QPATH];					/**< the base path of the main rma */
data/ufoai-2.5/src/server/sv_rma.h:138:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inheritBasePath[MAX_QPATH];			/**< only used during parsing, don't rely on any reasonable data after the parsing stage */
data/ufoai-2.5/src/server/sv_send.cpp:43:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SVC_STUFFTEXT];
data/ufoai-2.5/src/server/sv_send.cpp:69:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SVC_PRINT];
data/ufoai-2.5/src/server/sv_send.cpp:87:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char str[MAX_SVC_PRINT];
data/ufoai-2.5/src/server/sv_send.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char copy[1024];
data/ufoai-2.5/src/server/sv_user.cpp:187:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING];
data/ufoai-2.5/src/server/sv_user.cpp:260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char str[MAX_CLC_STRINGCMD];
data/ufoai-2.5/src/server/sv_world.cpp:630:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char filename[MAX_QPATH];
data/ufoai-2.5/src/shared/bfd.cpp:185:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(set->bc, &bc, sizeof(bc));
data/ufoai-2.5/src/shared/entitiesdef.cpp:42:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lastErr[ED_MAX_ERR_LEN]; /**< for storing last error message */
data/ufoai-2.5/src/shared/entitiesdef.cpp:43:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char lastErrExtra[ED_MAX_ERR_LEN]; /**< temporary storage for extra information to be added to lastErr */
data/ufoai-2.5/src/shared/entitiesdef.cpp:105:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(eDef->keyDefs, newKeyDefs, numKeyDefs * sizeof(entityKeyDef_t));
data/ufoai-2.5/src/shared/entitiesdef.cpp:194:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		v[i] = atoi(tok);
data/ufoai-2.5/src/shared/entitiesdef.cpp:327:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tokBuf[64];
data/ufoai-2.5/src/shared/entitiesdef.cpp:399:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char tokBuf[64];
data/ufoai-2.5/src/shared/entitiesdef.cpp:432:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	vectorLen = atoi(partToken);
data/ufoai-2.5/src/shared/entitiesdef.cpp:502:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newRanges, kd->ranges, kd->numRanges * sizeof(entityKeyRange_t*));
data/ufoai-2.5/src/shared/entitiesdef.cpp:569:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lastTokenBuf[ED_MAX_TOKEN_LEN];
data/ufoai-2.5/src/shared/entitiesdef.cpp:698:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
						ibuf[numElements++] = atoi(tok);
data/ufoai-2.5/src/shared/entitiesdef.cpp:715:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(kr->iArr, ibuf, size);
data/ufoai-2.5/src/shared/entitiesdef.cpp:720:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(kr->fArr, fbuf, size);
data/ufoai-2.5/src/shared/images.cpp:111:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char footer[26];
data/ufoai-2.5/src/shared/images.cpp:144:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(block_data, pixel_data, TGA_CHANNELS);
data/ufoai-2.5/src/shared/images.cpp:152:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&block_data[block_length * TGA_CHANNELS], pixel_data, TGA_CHANNELS);
data/ufoai-2.5/src/shared/images.cpp:164:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(block_data, pixel_data, TGA_CHANNELS);
data/ufoai-2.5/src/shared/images.cpp:181:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(&block_data[block_length * TGA_CHANNELS], pixel_data, TGA_CHANNELS);
data/ufoai-2.5/src/shared/images.cpp:268:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_QPATH];
data/ufoai-2.5/src/shared/images.cpp:298:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(dst, state.ptr, size);
data/ufoai-2.5/src/shared/infostring.cpp:41:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkey[512];
data/ufoai-2.5/src/shared/infostring.cpp:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char value[2][512] = {"", ""};
data/ufoai-2.5/src/shared/infostring.cpp:86:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(Info_ValueForKey(s, key));
data/ufoai-2.5/src/shared/infostring.cpp:97:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char pkey[512];
data/ufoai-2.5/src/shared/infostring.cpp:98:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[512];
data/ufoai-2.5/src/shared/infostring.cpp:171:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char newi[MAX_INFO_STRING];
data/ufoai-2.5/src/shared/keyvaluepair.h:67:10:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		return atoi(_valStr);
data/ufoai-2.5/src/shared/parse.cpp:32:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char com_token[4096];
data/ufoai-2.5/src/shared/shared.cpp:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char oldPath[MAX_OSPATH];
data/ufoai-2.5/src/shared/shared.cpp:417:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char string[16][VA_BUFSIZE];
data/ufoai-2.5/src/shared/shared.cpp:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/shared/shared.cpp:619:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char msg[1024];
data/ufoai-2.5/src/shared/sharedptr.h:30:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		typedef char completeCheck[sizeof(T) ? 1 : -1];(void)sizeof(completeCheck);
data/ufoai-2.5/src/shared/typedefs.h:35:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];			/**< the texture name */
data/ufoai-2.5/src/shared/typedefs.h:86:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/shared/typedefs.h:189:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	signed char _floor[PATHFINDING_HEIGHT][PATHFINDING_WIDTH][PATHFINDING_WIDTH];
data/ufoai-2.5/src/shared/typedefs.h:321:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mapEntityString[MAX_MAP_ENTSTRING];
data/ufoai-2.5/src/shared/typedefs.h:382:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char texture[32];			/**< texture name */
data/ufoai-2.5/src/shared/typedefs.h:449:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char			entdata[MAX_MAP_ENTSTRING];
data/ufoai-2.5/src/shared/utf8.cpp:263:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, src, length);
data/ufoai-2.5/src/tests/test_all.cpp:257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char name[32];
data/ufoai-2.5/src/tests/test_all.cpp:341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char msg[2048];
data/ufoai-2.5/src/tests/test_all.cpp:382:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		logFile = fopen(path, "wb");
data/ufoai-2.5/src/tests/test_campaign.cpp:1423:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char maps[2048];
data/ufoai-2.5/src/tests/test_campaign.cpp:1424:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char coords[2048];
data/ufoai-2.5/src/tests/test_dbuffer.cpp:55:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char data[128];
data/ufoai-2.5/src/tests/test_game.cpp:66:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char userinfo[MAX_INFO_STRING];
data/ufoai-2.5/src/tests/test_generic.cpp:336:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING] = "";
data/ufoai-2.5/src/tests/test_generic.cpp:352:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char info[MAX_INFO_STRING];
data/ufoai-2.5/src/tests/test_generic.cpp:391:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char dest[8192];
data/ufoai-2.5/src/tests/test_generic.cpp:480:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char targetBuf[256];
data/ufoai-2.5/src/tests/test_generic.cpp:481:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[16];
data/ufoai-2.5/src/tests/test_generic.cpp:579:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char server[512];
data/ufoai-2.5/src/tests/test_generic.cpp:580:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char uriPath[512];
data/ufoai-2.5/src/tests/test_generic.cpp:617:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char ipServer[MAX_VAR];
data/ufoai-2.5/src/tests/test_generic.cpp:715:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/ufoai-2.5/src/tests/test_generic.cpp:744:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char digest[41];
data/ufoai-2.5/src/tests/test_generic.cpp:756:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[65];
data/ufoai-2.5/src/tests/test_mapdef.cpp:79:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mapStr[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/tests/test_mapdef.cpp:80:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char posStr[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/tests/test_mapdef.cpp:223:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char mapStr[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/tests/test_mapdef.cpp:224:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char posStr[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/tests/test_mapdef.cpp:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char mapAssName[80];
data/ufoai-2.5/src/tests/test_mapdef.cpp:306:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char texNames[texCountMax][MAX_QPATH];
data/ufoai-2.5/src/tests/test_mapdef.cpp:454:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char userinfo[MAX_INFO_STRING];
data/ufoai-2.5/src/tests/test_rma.cpp:59:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mapStr[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/tests/test_rma.cpp:60:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char posStr[MAX_TOKEN_CHARS * MAX_TILESTRINGS];
data/ufoai-2.5/src/tests/test_rma.cpp:65:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_rma.cpp:76:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_rma.cpp:88:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_rma.cpp:108:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_rma.cpp:129:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_rma.cpp:162:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_rma.cpp:195:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_routing.cpp:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_routing.cpp:79:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char entityString[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tests/test_shared.cpp:56:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[1024];
data/ufoai-2.5/src/tests/test_shared.cpp:103:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_PROPERTY_NAME];
data/ufoai-2.5/src/tests/test_shared.cpp:199:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(element->value);
data/ufoai-2.5/src/tests/test_shared.cpp:214:9:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atol(element->value);
data/ufoai-2.5/src/tools/addr2line.cpp:210:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char addr[ADDR_BUF_LEN + 1] = { 0 };
data/ufoai-2.5/src/tools/addr2line.cpp:213:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(addr, "%p", xaddr);
data/ufoai-2.5/src/tools/addr2line.cpp:372:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char func[FUNC_MAX + 1] = { 0 };
data/ufoai-2.5/src/tools/addr2line.cpp:373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char file[PATH_MAX + 1] = { 0 };
data/ufoai-2.5/src/tools/memory.cpp:47:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char buf[256];
data/ufoai-2.5/src/tools/radiant/include/iarchive.h:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buf[2048];
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:247:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
inline void buffer_write_colour_fill (char buffer[128], const Colour3& colour)
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:249:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "(%g %g %g)", colour[0], colour[1], colour[2]);
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:252:39:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
inline void buffer_write_colour_wire (char buffer[128], const Colour3& colour)
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:254:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "<%g %g %g>", colour[0], colour[1], colour[2]);
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:257:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
inline void buffer_write_colour_blend (char buffer[128], const Colour3& colour)
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:259:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "[%g %g %g]", colour[0], colour[1], colour[2]);
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:264:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:271:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:278:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:285:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:292:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/ufoai-2.5/src/tools/radiant/libs/eclasslib.h:299:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[128];
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/clipboard.cpp:86:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(data + sizeof(std::size_t), ostream.data(), length);
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/cursor.cpp:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[(32 * 32) / 8];
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/entry.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/entry.h:38:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%d", i);
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/entry.h:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[32];
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/entry.h:45:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buf, "%g", f);
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/entry.h:56:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(entry_get_string(entry));
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/filechooser.cpp:102:78:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FileChooser::FileChooser (GtkWidget* parent, const std::string& title, bool open, bool browseFolders,
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/filechooser.cpp:104:100:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		_parent(parent), _dialog(NULL), _title(title), _pattern(pattern), _defaultExt(defaultExt), _open(open),
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/filechooser.h:93:67:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			FileChooser (GtkWidget* parent, const std::string& title, bool open, bool browseFolders,
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window.h:94:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[64];
data/ufoai-2.5/src/tools/radiant/libs/gtkutil/window.h:95:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "%d %d %d %d", position.x, position.y, position.w, position.h);
data/ufoai-2.5/src/tools/radiant/libs/stream/filestream.h:55:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			m_file = name.empty() ? 0 : fopen(name.c_str(), "rb");
data/ufoai-2.5/src/tools/radiant/libs/stream/filestream.h:149:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			m_file = name.empty() ? 0 : fopen(name.c_str(), "rb");
data/ufoai-2.5/src/tools/radiant/libs/stream/stringstream.h:202:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
			memcpy(buffer, _string.c_str(), written);
data/ufoai-2.5/src/tools/radiant/libs/stream/textfilestream.h:39:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			m_file = name.empty() ? 0 : fopen(name.c_str(), "rt");
data/ufoai-2.5/src/tools/radiant/libs/stream/textfilestream.h:71:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char buffer[buffer_size];
data/ufoai-2.5/src/tools/radiant/libs/stream/textfilestream.h:98:32:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
			m_file = name.empty() ? 0 : fopen(name.c_str(), "wt");
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:131:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:148:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:160:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:173:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:244:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buf[bufferSize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:300:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_buffer[SIZE];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:327:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_buffer[m_bufsize];
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:366:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char m_buffer[SIZE];
data/ufoai-2.5/src/tools/radiant/libs/string/WildcardMatcher.h:75:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
					if (open)
data/ufoai-2.5/src/tools/radiant/libs/string/string.h:176:9:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	return atoi(str.c_str());
data/ufoai-2.5/src/tools/radiant/libs/string/string.h:277:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char text[size];
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:206:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[16];
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:207:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "%d", self);
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:224:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[16];
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:225:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "%u", Unsigned(self));
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:239:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[16];
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:240:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "%g", self);
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:255:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[64];
data/ufoai-2.5/src/tools/radiant/libs/stringio.h:256:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(buffer, "%g %g %g", self[0], self[1], self[2]);
data/ufoai-2.5/src/tools/radiant/libs/uniquenames.h:44:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(buffer, "%u", m_value);
data/ufoai-2.5/src/tools/radiant/radiant/brush/construct/Cuboid.cpp:20:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		const unsigned char box[3][2] = { { 0, 1 }, { 2, 0 }, { 1, 2 } };
data/ufoai-2.5/src/tools/radiant/radiant/camera/view.cpp:46:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char g_cull_stats[1024];
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/AngleKey.h:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[64];
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/AngleKey.h:55:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(value, "%g", angle);
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/AnglesKey.h:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[64];
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/AnglesKey.h:74:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(value, "%g %g %g", invertangle1 ? -angles[1] : angles[1], angles[2], angles[0]);
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/OriginKey.h:45:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[64];
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/OriginKey.h:46:2:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
	sprintf(value, "%g %g %g", origin[0], origin[1], origin[2]);
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/ScaleKey.h:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char value[64];
data/ufoai-2.5/src/tools/radiant/radiant/entity/keys/ScaleKey.h:58:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
		sprintf(value, "%g %g %g", scale[0], scale[1], scale[2]);
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/DeflatedInputStream.h:42:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char m_buffer[m_bufsize];
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/pkzip.h:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char m_value[4];
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/pkzip.h:232:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		unsigned char buffer[bufsize];
data/ufoai-2.5/src/tools/radiant/radiant/log/console.cpp:57:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		g_hLogFile = fopen(logFileName.c_str(), "w");
data/ufoai-2.5/src/tools/radiant/radiant/main.cpp:316:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	FILE *pid = fopen(g_pidGameFile.c_str(), "r");
data/ufoai-2.5/src/tools/radiant/radiant/main.cpp:342:9:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		pid = fopen(g_pidGameFile.c_str(), "w");
data/ufoai-2.5/src/tools/radiant/radiant/map/map.cpp:778:70:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
const std::string Map::selectMapFile (const std::string& title, bool open)
data/ufoai-2.5/src/tools/radiant/radiant/map/map.cpp:783:87:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
	gtkutil::FileChooser fileChooser(GTK_WIDGET(GlobalRadiant().getMainWindow()), title, open, false, "map", ".map");
data/ufoai-2.5/src/tools/radiant/radiant/map/map.h:74:67:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
		const std::string selectMapFile (const std::string& title, bool open);
data/ufoai-2.5/src/tools/radiant/radiant/namespace/Namespace.cpp:28:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char buffer[1024];
data/ufoai-2.5/src/tools/radiant/radiant/namespace/Namespace.cpp:49:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char buffer[1024];
data/ufoai-2.5/src/tools/radiant/radiant/script/ScriptTokeniser.h:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char m_token[MAXTOKEN];
data/ufoai-2.5/src/tools/radiant/radiant/sidebar/PrefabSelector.cpp:90:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
					char buffer[256];
data/ufoai-2.5/src/tools/radiant/radiant/sound/OggFileStream.h:39:6:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
					memcpy(ptr, self->_curPtr, actualSizeToRead);
data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundPlayer.cpp:184:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char smallBuffer[4096];
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:29:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char magic[5];
data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp:356:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(row1, row2, outwidth4);
data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp:414:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(row1, row2, outwidth4);
data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(out, row1, outwidth4);
data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp:441:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(row1, row2, outwidth3);
data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp:492:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
						memcpy(row1, row2, outwidth3);
data/ufoai-2.5/src/tools/radiant/radiant/textures/TextureManipulator.cpp:498:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(out, row1, outwidth3);
data/ufoai-2.5/src/tools/radiant/radiant/url.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[2 * PATH_MAX];
data/ufoai-2.5/src/tools/radiant/radiant/url.cpp:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char command[2 * PATH_MAX];
data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.cpp:1166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char text[32];
data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.cpp:1169:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(text, "%g", x);
data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.cpp:1174:4:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
			sprintf(text, "%g", y);
data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.cpp:1262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
				char text[32];
data/ufoai-2.5/src/tools/radiant/radiant/xyview/XYWnd.cpp:1264:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
				sprintf(text, "%i,%i", (int) floor(x / blockSize), (int) floor(y / blockSize));
data/ufoai-2.5/src/tools/ufo2map/bspbrush.cpp:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(newbrush, brush, size);
data/ufoai-2.5/src/tools/ufo2map/check/check.cpp:797:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(overlap->p, vertbuf, numVert * sizeof(vec3_t));
data/ufoai-2.5/src/tools/ufo2map/check/checklib.cpp:100:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char out_buffer1[4096];
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:72:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:79:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:100:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char s_token[1024];
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:347:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(s_token) > MAX_ASE_MATERIALS) {
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:391:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->faces[pMesh->currentFace][0] = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:395:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->faces[pMesh->currentFace][2] = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:399:41:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->faces[pMesh->currentFace][1] = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:406:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			mtlID = atoi(p);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:428:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		a = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:430:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		c = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:432:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		b = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:449:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char u[80], v[80], w[80];
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:481:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->timeValue = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:486:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->numVertexes = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:492:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->numFaces = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:497:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		if (atoi(s_token) != pMesh->numFaces)
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:502:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		pMesh->numTVertexes = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:581:48:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		ase.objects[ase.currentObject].materialRef = atoi(s_token);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[100];
data/ufoai-2.5/src/tools/ufo2map/common/aselib.h:38:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char materialname[100];
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:223:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(dest, (const byte*)header + ofs, length);
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:508:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char key[1024];
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:509:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[1024];
data/ufoai-2.5/src/tools/ufo2map/common/polylib.cpp:78:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(w->p, p, nump * sizeof(p[0]));
data/ufoai-2.5/src/tools/ufo2map/common/polylib.cpp:201:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(c, w, size);
data/ufoai-2.5/src/tools/ufo2map/common/scriplib.cpp:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	filename[MAX_OSPATH];
data/ufoai-2.5/src/tools/ufo2map/common/scriplib.cpp:45:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char parsedToken[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tools/ufo2map/common/scriplib.h:27:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char parsedToken[MAX_TOKEN_CHARS];
data/ufoai-2.5/src/tools/ufo2map/common/shared.h:109:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char gamedir[MAX_VAR];
data/ufoai-2.5/src/tools/ufo2map/common/shared.h:124:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char baseFilename[MAX_OSPATH]; /**< This is used for extra file output functions */
data/ufoai-2.5/src/tools/ufo2map/csg.cpp:360:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
		memcpy(newbrush->sides, mb->original_sides, numsides * sizeof(side_t));
data/ufoai-2.5/src/tools/ufo2map/levels.cpp:268:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mapbrushes, mapbrushes + nummapbrushes, sizeof(mapbrush_t) * nummapbrushes);
data/ufoai-2.5/src/tools/ufo2map/lightmap.cpp:340:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			const int spawnflags = atoi(ValueForKey(e, "spawnflags"));
data/ufoai-2.5/src/tools/ufo2map/lightmap.cpp:422:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			sun_intensity = atoi(light);
data/ufoai-2.5/src/tools/ufo2map/lightmap.cpp:458:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
		i = atoi(ValueForKey(e, "quant"));
data/ufoai-2.5/src/tools/ufo2map/lightmap.cpp:964:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char filename[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/lightmap.cpp:982:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_QPATH], lightmapName[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/map.cpp:506:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileBase[MAX_OSPATH], materialPath[MAX_OSPATH];
data/ufoai-2.5/src/tools/ufo2map/map.cpp:583:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileBase[MAX_OSPATH];
data/ufoai-2.5/src/tools/ufo2map/map.cpp:675:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			side->contentFlags = atoi(GetToken());
data/ufoai-2.5/src/tools/ufo2map/map.cpp:676:43:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			side->surfaceFlags = td.surfaceFlags = atoi(GetToken());
data/ufoai-2.5/src/tools/ufo2map/map.cpp:677:15:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			td.value = atoi(GetToken());
data/ufoai-2.5/src/tools/ufo2map/map.cpp:800:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char string[32];
data/ufoai-2.5/src/tools/ufo2map/map.cpp:853:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(temp, mapbrushes + mapent->firstbrush, newbrushes * sizeof(*temp));
data/ufoai-2.5/src/tools/ufo2map/map.cpp:861:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mapbrushes + worldbrushes, temp, sizeof(*temp) * newbrushes);
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1128:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1185:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char name[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1230:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char entityString[MAX_TOKEN_CHARS] = "";
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1237:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
	subdivide = atoi(ValueForKey(&entities[0], "subdivide"));
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1257:2:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
	memcpy(mapbrushes + nummapbrushes, mapbrushes, sizeof(mapbrush_t) * nummapbrushes);
data/ufoai-2.5/src/tools/ufo2map/map.h:37:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char		name[MAX_TEXPATH];	/**< texture name - relative to base/textures */
data/ufoai-2.5/src/tools/ufo2map/patches.cpp:44:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char path[MAX_QPATH];
data/ufoai-2.5/src/tools/ufo2map/patches.cpp:183:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char name[16];
data/ufoai-2.5/src/tools/ufo2map/textures.h:34:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char	name[MAX_TEXPATH];
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char mapFilename[MAX_OSPATH];
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:55:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char baseFilename[MAX_OSPATH]; /**< This is used for extra file output functions */
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:172:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buffer[4096];
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:204:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char out_buffer[4096];
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:228:42:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
				config.verbosity = (verbosityLevel_t)atoi(argv[++i]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:307:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			threadstate.numthreads = atoi(argv[++i]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:330:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.nice = atoi(argv[++i]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:348:18:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.nice = atoi(argv[++i]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:398:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.block_xl = config.block_xh = atoi(argv[i + 1]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:399:40:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.block_yl = config.block_yh = atoi(argv[i + 2]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:403:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.block_xl = atoi(argv[i + 1]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:404:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.block_yl = atoi(argv[i + 2]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:405:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.block_xh = atoi(argv[i + 3]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:406:22:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.block_yh = atoi(argv[i + 4]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:422:30:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.lightquant = (byte)atoi(argv[i + 1]);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:549:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bspFilename[MAX_OSPATH];
data/ufoai-2.5/src/tools/ufo2map/writebsp.cpp:225:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char value[10];
data/ufoai-2.5/src/tools/ufomodel/md2.cpp:195:4:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
			strcpy(name, ".none");
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:64:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char fileName[MAX_QPATH];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:67:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char inputName[MAX_QPATH];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:89:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buffer[4096];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
		char outBuffer[4096];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:142:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char lname[MAX_QPATH];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:175:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	static char msg[1024];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:260:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char mdxFileName[MAX_QPATH];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:464:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char path[MD2_MAX_SKINNAME];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:465:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
			char pathBuf[MD2_MAX_SKINNAME];
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:488:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
				memcpy(skinPath, path, sizeof(path));
data/ufoai-2.5/src/tools/ufoslicer.cpp:24:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char filename[MAX_QPATH];
data/ufoai-2.5/src/tools/ufoslicer.cpp:61:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
			config.scale = atoi(argv[++i]);
data/ufoai-2.5/src/tools/ufoslicer.cpp:81:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char out_buffer[4096];
data/ufoai-2.5/src/tools/ufoslicer.cpp:93:2:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
	char bspFilename[MAX_OSPATH];
data/ufoai-2.5/src/client/battlescape/cl_hud_callbacks.cpp:332:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(rest) >= 4) {
data/ufoai-2.5/src/client/battlescape/cl_particle.cpp:1245:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					len = strlen(baseComponentToken);
data/ufoai-2.5/src/client/battlescape/events/e_main.cpp:219:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t length = strlen(sound) - 1;
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:168:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(type) <= 1)
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:172:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value[strlen(value) - 1] = '\0';
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:182:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(type) <= 1)
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:186:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value[strlen(value) - 1] = '\0';
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:213:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(type) <= 1)
data/ufoai-2.5/src/client/cgame/campaign/cp_event.cpp:217:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		value[strlen(value) - 1] = '\0';
data/ufoai-2.5/src/client/cgame/campaign/cp_event.h:50:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read;			/**< already read the mail? */
data/ufoai-2.5/src/client/cgame/campaign/cp_messages.cpp:221:77:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		cgi->XML_AddBoolValue(n, SAVE_MESSAGES_EVENTMAILREAD, message->eventMail->read);
data/ufoai-2.5/src/client/cgame/campaign/cp_rank.cpp:128:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rank->image == nullptr || !strlen(rank->image))
data/ufoai-2.5/src/client/cgame/campaign/cp_rank.cpp:131:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rank->name == nullptr || !strlen(rank->name))
data/ufoai-2.5/src/client/cgame/campaign/cp_rank.cpp:134:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (rank->shortname == nullptr || !strlen(rank->shortname))
data/ufoai-2.5/src/client/cgame/campaign/cp_research.cpp:1776:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (t->mail[j].read) {
data/ufoai-2.5/src/client/cgame/campaign/cp_research.h:117:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	bool read;				/**< already read the mail? */
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:82:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(header->name);
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:87:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(header->gameVersion);
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:92:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(header->gameDate);
data/ufoai-2.5/src/client/cgame/campaign/cp_save.cpp:97:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(header->realDate);
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:51:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += (strlen(pos) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:57:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += (strlen(pos) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:65:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += (strlen(pos) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:92:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += (strlen(pos) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:100:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += (strlen(pos) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_statistics.cpp:135:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	pos += (strlen(pos) + 1);
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:432:75:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (m->pedia->mail[TECHMAIL_PRE].from && !m->pedia->mail[TECHMAIL_PRE].read)
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:437:122:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (m->pedia->mail[TECHMAIL_RESEARCHED].from && RS_IsResearched_ptr(m->pedia) && !m->pedia->mail[TECHMAIL_RESEARCHED].read)
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:442:75:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (m->pedia->mail[TECHMAIL_PRE].from && !m->pedia->mail[TECHMAIL_PRE].read)
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:444:89:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (m->pedia->mail[TECHMAIL_RESEARCHED].from && !m->pedia->mail[TECHMAIL_RESEARCHED].read)
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:449:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (!m->eventMail->read)
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:520:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			if (!mail->read) {
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1036:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		bool read;
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1046:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read = mail.read;
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1057:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read = mail.read;
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1073:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read = mail->read;
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1084:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			read = mail.read;
data/ufoai-2.5/src/client/cgame/campaign/cp_ufopedia.cpp:1090:88:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		cgi->UI_ExecuteConfunc("add_mail %i \"%s\" \"%s\" %i \"%s\"", idx++, headline, icon, read, dateBuf);
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:611:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:617:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:634:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:641:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:679:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:685:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:693:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:700:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:762:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:778:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		data += strlen(data) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:973:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						data += strlen(token) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:974:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						maxLength -= (strlen(token) + 1);
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:991:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					data += strlen(v) + 1;
data/ufoai-2.5/src/client/cinematic/cl_sequence.cpp:992:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					maxLength -= (strlen(v) + 1);
data/ufoai-2.5/src/client/cl_console.cpp:116:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (width > size || strlen(txt) > size)
data/ufoai-2.5/src/client/cl_console.cpp:243:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (line[strlen(line) - 1] == '\n')
data/ufoai-2.5/src/client/cl_console.cpp:244:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			line[strlen(line) - 1] = 0;
data/ufoai-2.5/src/client/cl_console.cpp:278:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			FS_Write(lastLine, strlen(lastLine), &f);
data/ufoai-2.5/src/client/cl_console.cpp:475:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const int len = strlen(consoleMessage);
data/ufoai-2.5/src/client/cl_http.cpp:116:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(filePath);
data/ufoai-2.5/src/client/cl_http.cpp:135:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(escaped);
data/ufoai-2.5/src/client/cl_http.cpp:318:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t len = strlen(ufoPath);
data/ufoai-2.5/src/client/cl_http.cpp:408:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(path);
data/ufoai-2.5/src/client/cl_http.cpp:687:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i = strlen(dl->queueEntry->ufoPath);
data/ufoai-2.5/src/client/cl_http.cpp:705:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i = strlen(tempName);
data/ufoai-2.5/src/client/cl_http.cpp:756:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			len = strlen(q->ufoPath);
data/ufoai-2.5/src/client/cl_irc.cpp:636:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(irc_buffer) + strlen(appendString) + 1 >= sizeof(irc_buffer)) {
data/ufoai-2.5/src/client/cl_irc.cpp:636:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	while (strlen(irc_buffer) + strlen(appendString) + 1 >= sizeof(irc_buffer)) {
data/ufoai-2.5/src/client/cl_irc.cpp:642:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		memmove(irc_buffer, n + 1, strlen(n));
data/ufoai-2.5/src/client/cl_irc.cpp:947:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(trailing, IRC_INVITE_FOR_A_GAME, strlen(IRC_INVITE_FOR_A_GAME))) {
data/ufoai-2.5/src/client/cl_irc.cpp:951:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			Q_strncpyz(serverIPAndPort, trailing + strlen(IRC_INVITE_FOR_A_GAME), sizeof(serverIPAndPort));
data/ufoai-2.5/src/client/cl_irc.cpp:1000:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	size_t len = strlen(trailing) + 1;
data/ufoai-2.5/src/client/cl_irc.cpp:1696:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				const size_t msg_len = strlen(msg);
data/ufoai-2.5/src/client/cl_irc.cpp:1716:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const char* msg = Cmd_Args() + strlen(target) + 1;
data/ufoai-2.5/src/client/cl_irc.cpp:1718:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t msg_len = strlen(msg);
data/ufoai-2.5/src/client/cl_irc.cpp:1736:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			? Cmd_Args() + strlen(target) + strlen(modes) + 2
data/ufoai-2.5/src/client/cl_irc.cpp:1736:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			? Cmd_Args() + strlen(target) + strlen(modes) + 2
data/ufoai-2.5/src/client/cl_irc.cpp:1755:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				in += strlen(channel) + 1;
data/ufoai-2.5/src/client/cl_irc.cpp:1760:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
					out_len = strlen(out);
data/ufoai-2.5/src/client/cl_irc.cpp:1817:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		reason = Cmd_Args() + strlen(nick) + strlen(channel) + 2;
data/ufoai-2.5/src/client/cl_irc.cpp:1817:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		reason = Cmd_Args() + strlen(nick) + strlen(channel) + 2;
data/ufoai-2.5/src/client/cl_main.cpp:109:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	msg.add(cmd, strlen(cmd));
data/ufoai-2.5/src/client/cl_main.cpp:112:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		msg.add(Cmd_Args(), strlen(Cmd_Args()));
data/ufoai-2.5/src/client/cl_main.cpp:147:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const int l = strlen(Cmd_Args()) + 1;
data/ufoai-2.5/src/client/cl_main.cpp:314:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int l = strlen(in);
data/ufoai-2.5/src/client/cl_main.cpp:1014:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dbuffer msg(strlen(userInfo) + 2);
data/ufoai-2.5/src/client/cl_screen.cpp:75:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Con_DrawString(string, x, y, strlen(string));
data/ufoai-2.5/src/client/input/cl_keys.cpp:248:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			keyLinePos = strlen(keyLines[editLine]);
data/ufoai-2.5/src/client/input/cl_keys.cpp:289:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (keyLinePos < strlen(keyLines[editLine]))
data/ufoai-2.5/src/client/input/cl_keys.cpp:303:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		keyLinePos = strlen(keyLines[editLine]);
data/ufoai-2.5/src/client/input/cl_keys.cpp:319:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			keyLinePos = strlen(keyLines[editLine]);
data/ufoai-2.5/src/client/input/cl_keys.cpp:337:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((i = strlen(keyLines[editLine])) == keyLinePos)
data/ufoai-2.5/src/client/input/cl_keys.cpp:374:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		keyLinePos = strlen(keyLines[editLine]);
data/ufoai-2.5/src/client/input/cl_keys.cpp:435:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			i = strlen(keyLines[editLine]) - 1;
data/ufoai-2.5/src/client/renderer/r_font.cpp:507:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(wrap->text, text, sizeof(wrap->text));
data/ufoai-2.5/src/client/renderer/r_font.cpp:603:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	assert(strlen(text) >= chunk->pos + chunk->len);
data/ufoai-2.5/src/client/renderer/r_image.cpp:443:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/ufoai-2.5/src/client/renderer/r_main.cpp:112:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t maxLength = strlen(msg);
data/ufoai-2.5/src/client/renderer/r_material.cpp:541:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	j = strlen(name);
data/ufoai-2.5/src/client/renderer/r_misc.cpp:314:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
		strcpy(s, "");
data/ufoai-2.5/src/client/renderer/r_model_alias.cpp:251:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strncmp((const char*) buf, IDMDXHEADER, strlen(IDMDXHEADER))) {
data/ufoai-2.5/src/client/renderer/r_model_alias.cpp:255:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buffer += strlen(IDMDXHEADER) * sizeof(char);
data/ufoai-2.5/src/client/renderer/r_program.cpp:293:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t inLength = strlen(in);
data/ufoai-2.5/src/client/renderer/r_program.cpp:633:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length[0] = strlen(source);
data/ufoai-2.5/src/client/sound/s_main.cpp:163:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			char const* const fileWithPath = filename + strlen("sound/");
data/ufoai-2.5/src/client/sound/s_mumble.cpp:96:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	mumble_set_context(context, strlen(context) + 1);
data/ufoai-2.5/src/client/sound/s_music.cpp:153:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/ufoai-2.5/src/client/sound/s_sample.cpp:71:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(sound);
data/ufoai-2.5/src/client/ui/node/ui_node_material_editor.cpp:320:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!strncmp(md->name, stageName, strlen(md->name)))
data/ufoai-2.5/src/client/ui/node/ui_node_text2.cpp:75:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			lineSize = strlen(data);
data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp:148:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	editedCvar = Cvar_Get(&((const char*)node->text)[strlen(cvarRef)]);
data/ufoai-2.5/src/client/ui/node/ui_node_textentry.cpp:213:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int length = strlen(buffer);
data/ufoai-2.5/src/client/ui/ui_input.cpp:347:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		Q_strcat(newPath, sizeof(newPath), "%s%s", window->name, path + strlen(node->root->name));
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:338:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(node->name) != strlen(name))
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:338:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(node->name) != strlen(name))
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:594:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(newNode->name) != strlen(newName))
data/ufoai-2.5/src/client/ui/ui_nodes.cpp:594:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(newNode->name) != strlen(newName))
data/ufoai-2.5/src/client/ui/ui_parse.cpp:207:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		size = strlen(string) + 1;
data/ufoai-2.5/src/client/ui/ui_parse.cpp:718:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((property->type & V_BASETYPEMASK) == V_STRING && strlen(*token) > MAX_VAR - 1) {
data/ufoai-2.5/src/client/ui/ui_parse.cpp:748:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(*token) > MAX_VAR - 1) {
data/ufoai-2.5/src/client/ui/ui_parse.cpp:765:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if ((property->type & V_BASETYPEMASK) == V_STRING && strlen(*token) > MAX_VAR - 1) {
data/ufoai-2.5/src/client/web/web_main.cpp:144:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Com_SHA1Buffer((const byte*)combined, strlen(combined), digest);
data/ufoai-2.5/src/common/cmd.cpp:138:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int l = strlen(text);
data/ufoai-2.5/src/common/cmd.cpp:302:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s += strlen(Com_Argv(i)) + 1;
data/ufoai-2.5/src/common/cmd.cpp:413:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(s);
data/ufoai-2.5/src/common/cmd.cpp:469:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			for (i = 0; i < strlen(a->value); i++) {
data/ufoai-2.5/src/common/cmd.cpp:998:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(token);
data/ufoai-2.5/src/common/common.cpp:346:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strlen(msg) + strlen(rd_buffer)) > (rd_buffersize - 1)) {
data/ufoai-2.5/src/common/common.cpp:346:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if ((strlen(msg) + strlen(rd_buffer)) > (rd_buffersize - 1)) {
data/ufoai-2.5/src/common/common.cpp:371:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (output[strlen(output) - 1] == '\n') {
data/ufoai-2.5/src/common/common.cpp:374:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				FS_Write(timestamp, strlen(timestamp), &logfile);
data/ufoai-2.5/src/common/common.cpp:378:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			FS_Write(output, strlen(output), &logfile);
data/ufoai-2.5/src/common/common.cpp:593:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!argv[i] || strlen(argv[i]) >= MAX_TOKEN_CHARS)
data/ufoai-2.5/src/common/common.cpp:621:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(scan);
data/ufoai-2.5/src/common/common.cpp:650:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		i += strlen(token);
data/ufoai-2.5/src/common/common.cpp:660:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		j = strlen(cvarvalue);
data/ufoai-2.5/src/common/common.cpp:661:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(pos) + j >= MAX_STRING_CHARS) {
data/ufoai-2.5/src/common/common.cpp:771:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		cmdLine[strlen(cmdLine) - 1] = '\0';
data/ufoai-2.5/src/common/common.cpp:815:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int maxLength = std::min(strlen(cmdBackup),strlen(cvar));
data/ufoai-2.5/src/common/common.cpp:815:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			int maxLength = std::min(strlen(cmdBackup),strlen(cvar));
data/ufoai-2.5/src/common/common.cpp:834:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		*pos = strlen(target);
data/ufoai-2.5/src/common/common.cpp:1299:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	if (read > 0)
data/ufoai-2.5/src/common/cvar.cpp:928:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		l = strlen(token);
data/ufoai-2.5/src/common/files.cpp:334:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	int read;
data/ufoai-2.5/src/common/files.cpp:345:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		return read;
data/ufoai-2.5/src/common/files.cpp:357:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		if (read != block && feof(f->f))
data/ufoai-2.5/src/common/files.cpp:358:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			return (len - remaining + read);
data/ufoai-2.5/src/common/files.cpp:374:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		remaining -= read;
data/ufoai-2.5/src/common/files.cpp:375:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		buf += read;
data/ufoai-2.5/src/common/files.cpp:583:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (s[strlen(s) - 1] != '.')
data/ufoai-2.5/src/common/files.cpp:601:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (s[strlen(s) - 1] != '.') {
data/ufoai-2.5/src/common/files.cpp:717:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				LIST_AddString(mods, dirnames[i] + (strlen(pattern) + 1));
data/ufoai-2.5/src/common/files.cpp:784:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (!strlen(Cmd_Argv(2))) {	/* delete it */
data/ufoai-2.5/src/common/files.cpp:801:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	l->fromlength = strlen(l->from);
data/ufoai-2.5/src/common/files.cpp:1033:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			size_t l = strlen(files);
data/ufoai-2.5/src/common/files.cpp:1038:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			l -= (strlen(ext) + 1);
data/ufoai-2.5/src/common/files.cpp:1067:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t l = strlen(files) - strlen(wildcard);
data/ufoai-2.5/src/common/files.cpp:1067:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t l = strlen(files) - strlen(wildcard);
data/ufoai-2.5/src/common/http.cpp:40:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t protoLength = strlen(proto);
data/ufoai-2.5/src/common/http.cpp:319:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const bool success = strlen(encoded) < outLength;
data/ufoai-2.5/src/common/mem.cpp:111:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(name) + 1 >= MEM_MAX_POOLNAME)
data/ufoai-2.5/src/common/mem.cpp:427:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	out = (char*)_Mem_Alloc((size_t)(strlen(in) + 1), true, pool, tagNum, fileName, fileLine);
data/ufoai-2.5/src/common/netpack.cpp:64:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		buf->add(str, strlen(str) + 1);
data/ufoai-2.5/src/common/netpack.cpp:75:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	buf->add(str, strlen(str));
data/ufoai-2.5/src/common/netpack.cpp:563:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int len = LittleLong(strlen(string) + 1);
data/ufoai-2.5/src/common/netpack.cpp:566:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	NET_StreamEnqueue(s, string, strlen(string));
data/ufoai-2.5/src/common/routing.cpp:1472:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename, baseFilename, sizeof(filename) - 1);
data/ufoai-2.5/src/common/routing.cpp:1498:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(filename, baseFilename, sizeof(filename) - 1);
data/ufoai-2.5/src/common/scripts.cpp:128:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t namespaceLength = strlen(space);
data/ufoai-2.5/src/common/scripts.cpp:678:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		w = (int)strlen(token) + 1;
data/ufoai-2.5/src/common/scripts.cpp:688:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		w = (int)strlen((char *) b) + 1;
data/ufoai-2.5/src/common/scripts.cpp:694:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		w = (int)strlen(token) + 1;
data/ufoai-2.5/src/common/scripts.cpp:1044:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = (int)strlen((const char *) set) + 1;
data/ufoai-2.5/src/common/scripts.cpp:1051:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = (int)strlen((const char *) set) + 1;
data/ufoai-2.5/src/common/scripts.cpp:3722:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		checksum += LittleLong(Com_BlockChecksum(buf, strlen(buf)));
data/ufoai-2.5/src/common/unzip.cpp:767:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(szFileName)>=UNZ_MAXFILENAMEINZIP)
data/ufoai-2.5/src/game/g_cmds.cpp:51:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(smallBuf) + strlen(largeBuf) > sizeof(largeBuf) - 100) {
data/ufoai-2.5/src/game/g_cmds.cpp:51:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(smallBuf) + strlen(largeBuf) > sizeof(largeBuf) - 100) {
data/ufoai-2.5/src/game/g_cmds.cpp:106:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (s[0] == '"' && s[strlen(s) - 1] == '"') {
data/ufoai-2.5/src/game/g_cmds.cpp:107:5:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		s[strlen(s) - 1] = '\0';
data/ufoai-2.5/src/game/g_spawn.cpp:147:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t l = strlen(string) + 1;
data/ufoai-2.5/src/game/g_trigger.cpp:142:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		level.mapEndCommand = (char*)G_TagMalloc(strlen(command) + 1, TAG_GAME);
data/ufoai-2.5/src/game/g_trigger.cpp:143:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		Q_strncpyz(level.mapEndCommand, command, strlen(command));
data/ufoai-2.5/src/game/lua/lapi.cpp:458:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lua_pushlstring(L, s, strlen(s));
data/ufoai-2.5/src/game/lua/lauxlib.cpp:169:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *len = (def ? strlen(def) : 0);
data/ufoai-2.5/src/game/lua/lauxlib.cpp:343:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(p);
data/ufoai-2.5/src/game/lua/lauxlib.cpp:363:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (e == nullptr) e = fname + strlen(fname);
data/ufoai-2.5/src/game/lua/lauxlib.cpp:443:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  luaL_addlstring(B, s, strlen(s));
data/ufoai-2.5/src/game/lua/lauxlib.cpp:567:7:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  c = getc(lf.f);
data/ufoai-2.5/src/game/lua/lauxlib.cpp:570:17:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while ((c = getc(lf.f)) != EOF && c != '\n') ;  /* skip first line */
data/ufoai-2.5/src/game/lua/lauxlib.cpp:571:24:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (c == '\n') c = getc(lf.f);
data/ufoai-2.5/src/game/lua/lauxlib.cpp:577:16:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   while ((c = getc(lf.f)) != EOF && c != LUA_SIGNATURE[0])
data/ufoai-2.5/src/game/lua/lauxlib.cpp:620:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return luaL_loadbuffer(L, s, strlen(s), s);
data/ufoai-2.5/src/game/lua/ldblib.cpp:309:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (luaL_loadbuffer(L, buffer, strlen(buffer), "=(debug command)") ||
data/ufoai-2.5/src/game/lua/liolib.cpp:287:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc(f);
data/ufoai-2.5/src/game/lua/liolib.cpp:304:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    l = strlen(p);
data/ufoai-2.5/src/game/lua/llex.cpp:69:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lua_assert(strlen(luaX_tokens[i])+1 <= TOKEN_LEN);
data/ufoai-2.5/src/game/lua/loadlib.cpp:346:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (l == nullptr) l = path + strlen(path);
data/ufoai-2.5/src/game/lua/lobject.cpp:184:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(out, source+1, bufflen);  /* remove first character */
data/ufoai-2.5/src/game/lua/lobject.cpp:192:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      l = strlen(source);
data/ufoai-2.5/src/game/lua/lobject.cpp:193:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(out, "");
data/ufoai-2.5/src/game/lua/lobject.cpp:206:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(out, source, len);
data/ufoai-2.5/src/game/lua/lstring.h:20:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define luaS_new(L, s)	(luaS_newlstr(L, s, strlen(s)))
data/ufoai-2.5/src/game/lua/lstrlib.cpp:740:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(form, strfrmt, p - strfrmt + 1);
data/ufoai-2.5/src/game/lua/lstrlib.cpp:748:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t l = strlen(form);
data/ufoai-2.5/src/game/lua/lstrlib.cpp:819:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      luaL_addlstring(&b, buff, strlen(buff));
data/ufoai-2.5/src/game/lua/lvm.cpp:212:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(l);  /* index of first `\0' in both strings */
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:146:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = MIN(sizeof(lm->identity), strlen(identity)+1);
data/ufoai-2.5/src/libs/mumble/libmumblelink.c:164:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = MIN(sizeof(lm->description), strlen(description)+1);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:155:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	cloned = _pico_alloc(strlen(str) + 1);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:238:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (str[strlen(str) - 1] == '\n')
data/ufoai-2.5/src/libs/picomodel/picointernal.c:239:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		str[strlen(str) - 1] = '\0';
data/ufoai-2.5/src/libs/picomodel/picointernal.c:556:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t sublen = strlen(substr);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:617:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src = path + (strlen(path) - 1);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:641:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src = path + (strlen(path) - 1);
data/ufoai-2.5/src/libs/picomodel/picointernal.c:645:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(ext) < 1)
data/ufoai-2.5/src/libs/picomodel/picointernal.c:647:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(path) < 1)
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:369:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (p->token == NULL || !strlen(p->token))
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:385:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(lastNodeName, ptr, sizeof(lastNodeName));
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:651:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
				if (!strlen(p->token))
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:805:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
						if (!strlen(p->token))
data/ufoai-2.5/src/libs/picomodel/pm_ase.c:821:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
							mapname = _pico_alloc(strlen(name) + 1);
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:307:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(skinname, offsetSkin, MD2_MAX_SKINNAME);
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:313:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(path, fileName, MD2_MAX_SKINNAME);
data/ufoai-2.5/src/libs/picomodel/pm_md2.c:314:4:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
			strncpy(skinnameRelative, skinname, MD2_MAX_SKINNAME);
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:94:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (p->token == NULL || !strlen(p->token))
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:217:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (!strlen(model->fileName))
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:258:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (p->token == NULL || !strlen(p->token))
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:275:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (name == NULL || !strlen(name)) {
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:302:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (mapName == NULL || !strlen(mapName)) {
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:515:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (p->token == NULL || !strlen(p->token))
data/ufoai-2.5/src/libs/picomodel/pm_obj.c:593:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (groupName == NULL || !strlen(groupName)) {
data/ufoai-2.5/src/ports/unix/unix_console.cpp:64:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	while (read(STDIN_FILENO, &key, 1) != -1)
data/ufoai-2.5/src/ports/unix/unix_console.cpp:279:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		int avail = read(STDIN_FILENO, &key, 1);
data/ufoai-2.5/src/ports/unix/unix_console.cpp:313:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				avail = read(STDIN_FILENO, &key, 1);
data/ufoai-2.5/src/ports/unix/unix_console.cpp:318:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						avail = read(STDIN_FILENO, &key, 1);
data/ufoai-2.5/src/ports/unix/unix_console.cpp:377:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		len = read(STDIN_FILENO, text, sizeof(text));
data/ufoai-2.5/src/ports/unix/unix_console.cpp:399:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const ssize_t written = write(STDOUT_FILENO, string, strlen(string));
data/ufoai-2.5/src/ports/unix/unix_main.cpp:67:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(s_userName, p->pw_name, sizeof(s_userName));
data/ufoai-2.5/src/ports/unix/unix_main.cpp:204:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (match.file && strlen(match.file))
data/ufoai-2.5/src/ports/unix/unix_shared.cpp:81:2:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
	usleep(milliseconds * 1000);
data/ufoai-2.5/src/ports/windows/win_main.cpp:84:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(curDir) > (MAX_OSPATH - MAX_QPATH))
data/ufoai-2.5/src/ports/windows/win_shared.cpp:469:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t n = strlen(name) + strlen(value) + 2;
data/ufoai-2.5/src/ports/windows/win_shared.cpp:469:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t n = strlen(name) + strlen(value) + 2;
data/ufoai-2.5/src/ports/windows/win_shared.cpp:472:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
	strcat(strcat(strcpy(str, name), "="), value);
data/ufoai-2.5/src/server/sv_ccmds.cpp:307:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (text[strlen(text)] == '"')
data/ufoai-2.5/src/server/sv_ccmds.cpp:308:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		text[strlen(text)] = 0;
data/ufoai-2.5/src/server/sv_game.cpp:122:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dbuffer msg(4 + strlen(name));
data/ufoai-2.5/src/server/sv_game.cpp:178:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		dbuffer msg(4 + strlen(val));
data/ufoai-2.5/src/server/sv_main.cpp:164:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dbuffer msg(2 + strlen(message));
data/ufoai-2.5/src/server/sv_main.cpp:474:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(Info_ValueForKey(userinfo, "ip"))) {  /* catch spoofed ips  */
data/ufoai-2.5/src/server/sv_main.cpp:988:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	dbuffer msg(2 + strlen(message));
data/ufoai-2.5/src/server/sv_world.cpp:664:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!Q_strcasecmp(mod->name + strlen(mod->name) - 4, ".obj"))
data/ufoai-2.5/src/shared/bfd.cpp:51:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ob->ptr = strlen(ob->buf + ob->ptr) + ob->ptr;
data/ufoai-2.5/src/shared/entitiesdef.cpp:87:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
		strncat(lastErr, lastErrExtra, sizeof(lastErr) - strlen(lastErr) -1); \
data/ufoai-2.5/src/shared/entitiesdef.cpp:87:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		strncat(lastErr, lastErrExtra, sizeof(lastErr) - strlen(lastErr) -1); \
data/ufoai-2.5/src/shared/entitiesdef.cpp:255:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ED_TEST_RETURN_ERROR(strlen(value) != (unsigned int)(end_p-value),
data/ufoai-2.5/src/shared/entitiesdef.cpp:330:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tokBuf, value, sizeof(tokBuf));
data/ufoai-2.5/src/shared/entitiesdef.cpp:408:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ED_TEST_RETURN_ERROR((strlen(parsedToken) + 1) > sizeof(tokBuf),
data/ufoai-2.5/src/shared/entitiesdef.cpp:410:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(tokBuf, parsedToken, sizeof(tokBuf));
data/ufoai-2.5/src/shared/entitiesdef.cpp:437:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	kd->vLen = strlen(partToken) ? (vectorLen ? vectorLen : 1) : 1; /* default is 1 */
data/ufoai-2.5/src/shared/entitiesdef.cpp:627:6:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
					strncpy(lastTokenBuf, parsedToken, sizeof(lastTokenBuf));
data/ufoai-2.5/src/shared/images.cpp:219:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
	strncpy(&footer[8] , "TRUEVISION-XFILE", 16);
data/ufoai-2.5/src/shared/infostring.cpp:127:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const size_t size = strlen(s);
data/ufoai-2.5/src/shared/infostring.cpp:188:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(key) > MAX_INFO_KEY - 1) {
data/ufoai-2.5/src/shared/infostring.cpp:193:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(key) > MAX_INFO_VALUE - 1) {
data/ufoai-2.5/src/shared/shared.cpp:52:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	right = s + strlen(s) - 1;
data/ufoai-2.5/src/shared/shared.cpp:85:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t length = strlen(s);
data/ufoai-2.5/src/shared/shared.cpp:284:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char* src = path + strlen(path) - 1;
data/ufoai-2.5/src/shared/shared.cpp:304:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	src = path + strlen(path) - 1;
data/ufoai-2.5/src/shared/shared.cpp:321:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char* s = in + strlen(in) - 1;
data/ufoai-2.5/src/shared/shared.cpp:486:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t dest_length = strlen(dest);
data/ufoai-2.5/src/shared/shared.cpp:564:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t sublen = strlen(substr);
data/ufoai-2.5/src/shared/shared.cpp:587:100:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		int const len = snprintf(dest, destsize, "%.*s%s%s", (int)(hit - source), source, replace, hit + strlen(pattern));
data/ufoai-2.5/src/shared/stringhunk.cpp:36:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t strLength = strlen(string);
data/ufoai-2.5/src/shared/stringhunk.cpp:71:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		string += strlen(string) + 1;
data/ufoai-2.5/src/shared/utf8.cpp:51:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	memmove(&s[start], &s[next], strlen(&s[next]) + 1);
data/ufoai-2.5/src/shared/utf8.cpp:69:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int tail = strlen(&s[pos]) + 1;
data/ufoai-2.5/src/shared/utf8.cpp:251:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	length = strlen(src);
data/ufoai-2.5/src/tests/test_generic.cpp:201:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const size_t length = strlen(data);
data/ufoai-2.5/src/tests/test_generic.cpp:704:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		const size_t expected = strlen(test) - 2;
data/ufoai-2.5/src/tests/test_generic.cpp:735:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const char* md5 = Com_MD5Buffer((const byte*)in, strlen(in));
data/ufoai-2.5/src/tests/test_generic.cpp:745:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Com_SHA1Buffer((const byte*)in, strlen(in), digest);
data/ufoai-2.5/src/tests/test_generic.cpp:755:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	Com_SHA2Csum((const byte*)in, strlen(in), digest);
data/ufoai-2.5/src/tools/radiant/include/iarchive.h:81:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			while ((numRead = strm.read(buf, 2048)) > 0)
data/ufoai-2.5/src/tools/radiant/include/idatastream.h:39:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	virtual size_type read(byte_type* buffer, size_type length) = 0;
data/ufoai-2.5/src/tools/radiant/include/itextstream.h:45:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		virtual std::size_t read (char* buffer, std::size_t length) = 0;
data/ufoai-2.5/src/tools/radiant/libs/archivelib.h:58:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				m_end = m_buffer + m_inputStream.read(m_buffer, SIZE);
data/ufoai-2.5/src/tools/radiant/libs/archivelib.h:83:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::size_t read (char* buffer, std::size_t length)
data/ufoai-2.5/src/tools/radiant/libs/bytestreamutils.h:56:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	istream.read(reinterpret_cast<typename InputStreamType::byte_type*> (&value), sizeof(Type));
data/ufoai-2.5/src/tools/radiant/libs/bytestreamutils.h:65:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	istream.read(reinterpret_cast<typename InputStreamType::byte_type*> (&value), sizeof(Type));
data/ufoai-2.5/src/tools/radiant/libs/bytestreamutils.h:75:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	istream.read(&b, 1);
data/ufoai-2.5/src/tools/radiant/libs/bytestreamutils.h:122:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	istream.read(&b, sizeof(typename InputStreamType::byte_type));
data/ufoai-2.5/src/tools/radiant/libs/container/hashfunc.h:353:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
		strncpy(reinterpret_cast<char*>(m_key.data()), string, m_key.size());
data/ufoai-2.5/src/tools/radiant/libs/container/hashfunc.h:359:7:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
	bool equal(const HashKey& other) const {
data/ufoai-2.5/src/tools/radiant/libs/container/hashfunc.h:361:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		       && std::equal(m_key.begin(), m_key.end(), other.m_key.begin());
data/ufoai-2.5/src/tools/radiant/libs/container/hashfunc.h:377:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		return equal(other);
data/ufoai-2.5/src/tools/radiant/libs/container/hashfunc.h:380:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
		return !equal(other);
data/ufoai-2.5/src/tools/radiant/libs/imagelib.h:93:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			length = file.getInputStream().read(buffer, file.size());
data/ufoai-2.5/src/tools/radiant/libs/picomodel/model.cpp:152:55:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	return reinterpret_cast<InputStream*> (inputStream)->read(buffer, length);
data/ufoai-2.5/src/tools/radiant/libs/stream/filestream.h:68:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size_type read (byte_type* buffer, size_type length)
data/ufoai-2.5/src/tools/radiant/libs/stream/filestream.h:131:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size_type read (byte_type* buffer, size_type length)
data/ufoai-2.5/src/tools/radiant/libs/stream/filestream.h:133:33:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			size_type result = m_istream.read(buffer, std::min(length, m_remaining));
data/ufoai-2.5/src/tools/radiant/libs/stream/memstream.h:66:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	std::size_t read(char* buffer, std::size_t length) {
data/ufoai-2.5/src/tools/radiant/libs/stream/stringstream.h:200:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::size_t read (char* buffer, std::size_t length) {
data/ufoai-2.5/src/tools/radiant/libs/stream/textfilestream.h:74:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				std::size_t size = read(buffer, buffer_size);
data/ufoai-2.5/src/tools/radiant/libs/stream/textfilestream.h:82:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::size_t read (char* buffer, std::size_t length)
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:184:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	ostream.write(string, strlen(string));
data/ufoai-2.5/src/tools/radiant/libs/stream/textstream.h:305:36:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		m_end = m_buffer + m_inputStream.read(m_buffer, SIZE);
data/ufoai-2.5/src/tools/radiant/radiant/entity/entitydef/EntityClassScanner.cpp:162:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	const std::size_t realsize = stream.read(entities, size);
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/FileSystem.cpp:161:47:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		std::size_t length = file->getInputStream().read((InputStream::byte_type*) *buffer, file->size());
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/DeflatedInputStream.h:64:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		size_type read (byte_type* buffer, size_type length)
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/DeflatedInputStream.h:71:58:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					m_zipstream.avail_in = static_cast<uInt> (m_istream.read(m_buffer, m_bufsize));
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/ZipArchive.cpp:144:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	m_istream.read(reinterpret_cast<FileInputStream::byte_type*> (const_cast<char*> (path.data())), namelength);
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/pkzip.h:46:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
	istream.read(reinterpret_cast<InputStream::byte_type*> (magic.m_value), 4);
data/ufoai-2.5/src/tools/radiant/radiant/filesystem/pk3/pkzip.h:241:41:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
			StreamBase::size_type size = istream.read(buffer, to_read);
data/ufoai-2.5/src/tools/radiant/radiant/pathfinding/RoutingLumpLoader.cpp:251:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
		stream.read(buf, size);
data/ufoai-2.5/src/tools/radiant/radiant/render/OpenGLRenderSystem.cpp:98:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		char const* const terminator = where + strlen(extension);
data/ufoai-2.5/src/tools/radiant/radiant/sidebar/PrefabSelector.cpp:104:43:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
						const std::size_t realsize = stream.read(buffer, file->size());
data/ufoai-2.5/src/tools/radiant/radiant/sidebar/PrefabSelector.cpp:331:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(gtk_entry_get_text(self->_filterEntry)) == 0)
data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundPlayer.cpp:17:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
#define usleep(x) Sleep((x)/1000)
data/ufoai-2.5/src/tools/radiant/radiant/sound/SoundPlayer.cpp:230:4:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
			usleep(10000);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:38:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (magic), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:46:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&size), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:49:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (magic), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:55:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (magic), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:62:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&subChunk1Size), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:70:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&audioFormat), 2);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:78:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&channels), 2);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:82:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&freq), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:85:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(temp, 6);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:89:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&bps), 2);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:122:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (magic), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:129:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					stream.read(temp, 8);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:132:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
					stream.read(reinterpret_cast<byte*> (magic), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:140:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(reinterpret_cast<byte*> (&remainingSize), 4);
data/ufoai-2.5/src/tools/radiant/radiant/sound/WavFileLoader.h:146:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
				stream.read(buffer, remainingSize);
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:328:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		len = strlen(bitmap) - 1;
data/ufoai-2.5/src/tools/ufo2map/common/aselib.cpp:405:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			p += strlen("*MESH_MTLID") + 1;
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:408:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	s = str + strlen(str) - 1;
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:427:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(key) >= MAX_KEY - 1)
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:430:6:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	if (strlen(value) >= MAX_VALUE - 1)
data/ufoai-2.5/src/tools/ufo2map/common/bspfile.cpp:532:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	curTile->entdatasize = strlen(curTile->entdata);
data/ufoai-2.5/src/tools/ufo2map/common/scriplib.cpp:49:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(script.filename, filename, sizeof(script.filename));
data/ufoai-2.5/src/tools/ufo2map/map.cpp:655:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (strlen(parsedToken) >= MAX_TEXPATH) {
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1192:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int lMaps = strlen(mapsDir);
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1193:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int l = strlen(filename);
data/ufoai-2.5/src/tools/ufo2map/map.cpp:1194:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	const int targetLength = strlen(mapFilename) - lMaps - l;
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:156:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			const int len = strlen(v->flags);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:227:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
			if (strlen(argv[i + 1]) == 1)
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:583:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(baseFilename, mapFilename, sizeof(baseFilename) - 1);
data/ufoai-2.5/src/tools/ufo2map/ufo2map.cpp:584:2:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
	strncpy(bspFilename, mapFilename, sizeof(bspFilename) - 1);
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:118:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	len = strlen(name);
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:217:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!Q_strcasecmp(mod->name + strlen(mod->name) - 4, ".obj"))
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:243:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
	FS_Write(IDMDXHEADER, strlen(IDMDXHEADER), &f);
data/ufoai-2.5/src/tools/ufomodel/ufomodel.cpp:424:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
		if (!Q_strcasecmp(fileName + strlen(fileName) - 4, ".obj"))

ANALYSIS SUMMARY:

Hits = 1818
Lines analyzed = 357191 in approximately 8.96 seconds (39862 lines/second)
Physical Source Lines of Code (SLOC) = 229381
Hits@level = [0] 267 [1] 354 [2] 1355 [3]  36 [4]  73 [5]   0
Hits@level+ = [0+] 2085 [1+] 1818 [2+] 1464 [3+] 109 [4+]  73 [5+]   0
Hits/KSLOC@level+ = [0+] 9.08968 [1+] 7.92568 [2+] 6.38239 [3+] 0.475192 [4+] 0.318248 [5+]   0
Dot directories skipped = 1 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.