Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/iortcw-1.51.c+dfsg1/MP/MAIN/UI/menudef.h Examining data/iortcw-1.51.c+dfsg1/MP/MAIN/ui_mp/menudef.h Examining data/iortcw-1.51.c+dfsg1/MP/code/asm/ftola.c Examining data/iortcw-1.51.c+dfsg1/MP/code/asm/qasm-inline.h Examining data/iortcw-1.51.c+dfsg1/MP/code/asm/qasm.h Examining data/iortcw-1.51.c+dfsg1/MP/code/asm/snapvector.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/aasfile.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bsp.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_cluster.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_cluster.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_debug.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_debug.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_def.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_entity.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_entity.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_file.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_file.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_funcs.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_move.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_move.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_optimize.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_optimize.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routealt.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routealt.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routetable.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routetable.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_sample.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_sample.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_gen.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_gen.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_move.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_move.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ea.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ea.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_interface.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_interface.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/botai.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/botlib.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_crc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_crc.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_memory.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_memory.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_struct.c Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_struct.h Examining data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_utils.h Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_drawtools.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_flamethrower.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_localents.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_marks.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_playerstate.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_predict.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_snapshot.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_spawn.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_syscalls.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_trails.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c Examining data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_avi.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_curl.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_curl.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_input.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_net_chan.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_ui.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/client.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/keycodes.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/keys.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/qal.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/qal.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_adpcm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_altivec.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec_ogg.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec_opus.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec_wav.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_mem.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_mix.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/client/snd_wavelet.c Examining data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_characters.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_debug.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_events.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_fight.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_fight.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_func_attack.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_func_boss1.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_global.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_ents.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_sight.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_think.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_misc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_pmove.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/bg_slidemove.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/chars.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_active.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_alarm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_antilag.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_combat.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_items.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_mem.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_mover.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_session.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_syscalls.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_tramcar.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c Examining data/iortcw-1.51.c+dfsg1/MP/code/game/inv.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/match.h Examining data/iortcw-1.51.c+dfsg1/MP/code/game/syn.h Examining data/iortcw-1.51.c+dfsg1/MP/code/null/mac_net.c Examining data/iortcw-1.51.c+dfsg1/MP/code/null/null_client.c Examining data/iortcw-1.51.c+dfsg1/MP/code/null/null_glimp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/null/null_input.c Examining data/iortcw-1.51.c+dfsg1/MP/code/null/null_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/null/null_net.c Examining data/iortcw-1.51.c+dfsg1/MP/code/null/null_snddma.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_load.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_patch.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_patch.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_polylib.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_polylib.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_test.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_trace.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/huffman.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/json.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md4.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/pbmd5.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/puff.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/puff.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_math.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_platform.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/surfaceflags.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_interpreted.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_none.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc_asm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc_asm.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.h Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_x86.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c Examining data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/anorms256.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/qgl.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_animation.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_backend.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_cmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_curve.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_dsa.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_dsa.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_extensions.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_extramath.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_extramath.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_extratypes.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_fbo.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_fbo.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_flares.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_font.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_bmp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_dds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_jpg.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_pcx.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_png.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_light.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_marks.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_mesh.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_noise.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_postprocess.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_postprocess.h Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_scene.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shade.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shade_calc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shadows.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_sky.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_subs.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_surface.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c Examining data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_world.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/anorms256.h Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/iqm.h Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/qgl.h Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_altivec.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_animation.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_backend.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bloom.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_cmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_cmesh.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_curve.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_flares.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_font.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_bmp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_jpg.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_pcx.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_png.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_light.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_marks.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_mesh.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model_iqm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_noise.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_scene.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade_calc.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shadows.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_subs.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_surface.c Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_types.h Examining data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_world.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_gamma.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_icon.h Examining data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_input.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_snd.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/server.h Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_bot.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_net_chan.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_snapshot.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_wallhack.c Examining data/iortcw-1.51.c+dfsg1/MP/code/server/sv_world.c Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_angles.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_angles.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_matrix.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_matrix.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_quaternion.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_quaternion.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_vector.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/math_vector.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/util_list.h Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp Examining data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/con_log.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/con_passive.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_loadlib.h Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/win_resource.h Examining data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c Examining data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c Examining data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h Examining data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/mathlib.h Examining data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/opstrings.h Examining data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_public.h Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h Examining data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_syscalls.c Examining data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.c Examining data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.h Examining data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/unzip.c Examining data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/unzip.h Examining data/iortcw-1.51.c+dfsg1/SP/code/asm/ftola.c Examining data/iortcw-1.51.c+dfsg1/SP/code/asm/qasm-inline.h Examining data/iortcw-1.51.c+dfsg1/SP/code/asm/qasm.h Examining data/iortcw-1.51.c+dfsg1/SP/code/asm/snapvector.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/aasfile.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bsp.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_cluster.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_cluster.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_debug.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_debug.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_def.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_entity.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_entity.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_file.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_file.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_funcs.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_move.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_move.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_optimize.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_optimize.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routealt.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routealt.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routetable.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routetable.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_sample.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_sample.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_gen.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_gen.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_move.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_move.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ea.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ea.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_interface.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_interface.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/botai.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/botlib.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_crc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_crc.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_memory.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_memory.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_struct.c Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_struct.h Examining data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_utils.h Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_drawtools.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_flamethrower.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_localents.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_marks.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_playerstate.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_predict.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_sound.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_syscalls.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_trails.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_view.c Examining data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_avi.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_console.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_curl.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_curl.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_input.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_net_chan.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/cl_ui.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/client.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/keycodes.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/keys.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/qal.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/qal.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_adpcm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_altivec.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec_ogg.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec_opus.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec_wav.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_mem.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_mix.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/client/snd_wavelet.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_characters.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_debug.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_events.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_fight.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_fight.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_func_attack.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_func_boss1.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_global.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_ents.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_sight.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_think.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_misc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_pmove.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/bg_slidemove.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/chars.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_active.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_alarm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_combat.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_func_decs.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_funcs.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_items.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_mem.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_missile.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_mover.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_session.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_syscalls.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_tramcar.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/g_weapon.c Examining data/iortcw-1.51.c+dfsg1/SP/code/game/inv.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/match.h Examining data/iortcw-1.51.c+dfsg1/SP/code/game/syn.h Examining data/iortcw-1.51.c+dfsg1/SP/code/null/mac_net.c Examining data/iortcw-1.51.c+dfsg1/SP/code/null/null_client.c Examining data/iortcw-1.51.c+dfsg1/SP/code/null/null_glimp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/null/null_input.c Examining data/iortcw-1.51.c+dfsg1/SP/code/null/null_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/null/null_net.c Examining data/iortcw-1.51.c+dfsg1/SP/code/null/null_snddma.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_load.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_patch.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_patch.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_polylib.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_polylib.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_test.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_trace.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/huffman.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/json.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md4.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/puff.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/puff.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_math.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_platform.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/surfaceflags.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_interpreted.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_none.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc_asm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc_asm.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.h Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_x86.c Examining data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/anorms256.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/qgl.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_animation.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_backend.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_cmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_curve.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_dsa.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_dsa.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_extensions.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_extramath.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_extramath.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_extratypes.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_fbo.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_fbo.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_flares.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_font.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_bmp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_dds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_jpg.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_pcx.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_png.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_light.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_marks.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_mesh.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_noise.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_postprocess.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_postprocess.h Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_scene.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shade.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shade_calc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shadows.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_sky.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_subs.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_surface.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c Examining data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_world.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/anorms256.h Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/iqm.h Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/qgl.h Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_altivec.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_animation.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_backend.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bloom.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_cmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_cmesh.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_curve.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_flares.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_font.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_bmp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_jpg.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_pcx.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_png.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_light.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_marks.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_mesh.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model_iqm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_noise.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_scene.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade_calc.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shadows.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_subs.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_surface.c Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_types.h Examining data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_world.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_gamma.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_icon.h Examining data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_input.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_snd.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/server.h Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_bot.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_init.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_net_chan.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_snapshot.c Examining data/iortcw-1.51.c+dfsg1/SP/code/server/sv_world.c Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_angles.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_angles.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_matrix.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_matrix.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_quaternion.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_quaternion.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_vector.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/math_vector.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/util_list.h Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp Examining data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/con_log.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/con_passive.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_loadlib.h Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c Examining data/iortcw-1.51.c+dfsg1/SP/code/sys/win_resource.h Examining data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c Examining data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h Examining data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/mathlib.h Examining data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/opstrings.h Examining data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_public.h Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h Examining data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_syscalls.c Examining data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.c Examining data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.h Examining data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/unzip.c Examining data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/unzip.h Examining data/iortcw-1.51.c+dfsg1/SP/main/ui/menudef.h FINAL RESULTS: data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:647:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(fn, filename, sizeof(fn)-1); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:647:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(fn, filename, sizeof(fn)-1); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:470:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( epair->key, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:478:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( epair->value, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:171:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ( *aasworld ).configstrings[i], configstrings[i] ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.h:43:62: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL AAS_Error(char *fmt, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:198:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ch->c[i].value.string, defaultch->c[i].value.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:223:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ch->filename, charfile ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:290:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ch->c[index].value.string, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:510:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( out->filename, ch1->filename ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:529:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( out->c[i].value.string, ch1->c[i].value.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:728:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( synonym->string, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:929:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( ptr, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:945:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( &ptr[strlen( ptr )], "%cr%s%c", ESCAPE_CHAR, token.string, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1043:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( random->string, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1071:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( randomstring->string, chatmessagestring ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1252:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( matchstring->string, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1587:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s->string, temp ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1839:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( namebuffer, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1847:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( key->string, namebuffer ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1859:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( key->string, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1889:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( chatmessage->chatmessage, chatmessagestring ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2046:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( chatmessage->chatmessage, chatmessagestring ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2235:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &outputbuf[len], temp ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2262:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &outputbuf[len], ptr ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2300:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( srcmessage, message ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2306:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( srcmessage, chatstate->chatmessage ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2533:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( match.string, message ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:367:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( config->weights[config->numweights].name, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/botlib.h:192:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (QDECL *Print)(int type, char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c:91:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v->name, var_name ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c:195:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v->string, value ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c:246:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v->string, value ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.c:140:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( logfile.fp, fmt, ap ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.c:165:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( logfile.fp, fmt, ap ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.h:47:62: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Log_Write(char *fmt, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.h:49:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Log_WriteTimeStamped(char *fmt, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:483:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( t1->string, t2->string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:491:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( t1->string, &t2->string[1] ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:679:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( define->name, builtin[i].string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:721:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( token->string, source->scriptstack->filename ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:1191:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( define->name, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:1425:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( newdefine->name, define->name ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2727:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( token->string, newtoken.string + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2963:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( source->includepath, PATHSEPERATOR_STR ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:3175:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( pc_token->string, token.string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:3199:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( filename, sourceFiles[handle]->filename ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.h:153:82: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL SourceError(source_t *source, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.h:155:85: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL SourceWarning(source_t *source, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.h:257:82: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL ScriptError(script_t *script, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.h:259:84: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL ScriptWarning(script_t *script, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:130:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( targetName, S_COLOR_WHITE ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:255:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( attackerName, S_COLOR_WHITE ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1784:70: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL CG_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1785:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL CG_Error( const char *msg, ... ) __attribute__ ((noreturn, format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:58:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( systemChat, p ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:60:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( teamChat2, teamChat1 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:61:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( teamChat1, p ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1374:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( token, CG_TranslateString( temp ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1394:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( token, CG_TranslateString( temp ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_snapshot.c:179:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( prevmap, curmap ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:341:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( bigConfigString, s ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:350:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( bigConfigString, s ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:1476:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( cinTable[currentHandle].fileName, name ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2011:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( cmd, Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3304:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( groupStr, Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3306:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( itemStr, Cmd_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3309:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( itemStr, Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3407:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void QDECL CL_RefPrintf( int print_level, const char *fmt, ...) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3699:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( fileName, va( "translations/%s.cfg", Cmd_Argv( 1 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5169:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( cl.limboChatMsgs[i], cl.limboChatMsgs[i - 1] ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5436:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( format_org, va( "%c%c ", '%', original[i + 1] ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5450:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( format_trans, va( "%c%c ", '%', translated[i + 1] ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5513:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( cl.translationVersion, token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5528:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( original, token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5542:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( translated[LANGUAGE_FRENCH], token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5557:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( translated[LANGUAGE_GERMAN], token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5572:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( translated[LANGUAGE_ITALIAN], token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5587:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( translated[LANGUAGE_SPANISH], token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5714:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buf, string ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5741:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buf + offset, t->translated[currentLanguage] ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5768:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buf + offset, string ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:348:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( string, "RECORDING %s: %ik", clc.demoName, pos / 1024 ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:387:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( string, "VoIP: [%s]", buffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:324:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sfx->soundName, name); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:232:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr->filename, filename); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.h:577:81: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void AICast_Printf( int type, const char *fmt, ... ) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_debug.c:158:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ent->classname, cmd ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:981:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, BotRandomOpponentName( bs ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:1247:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, BotRandomOpponentName( bs ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:635:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( buf, wp->name ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.h:231:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL BotAI_Print(int type, char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:457:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( pch, string ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:194:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat( char *strDestination, const char *strSource ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:223:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy( char *strDestination, const char *strSource ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:2087:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf( const char *buffer, const char *fmt, ... ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:87:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat( char *strDestination, const char *strSource ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:89:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy( char *strDestination, const char *strSource ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:107:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf( const char *buffer, const char *fmt, ... ) __attribute__ ((format (scanf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:107:80: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. int sscanf( const char *buffer, const char *fmt, ... ) __attribute__ ((format (scanf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_public.h:1703:78: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL BG_AnimParseError( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:94:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( string + stringlength, entry ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:994:72: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_LogPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:996:69: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_Printf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:997:70: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_DPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:998:78: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_Error( const char *fmt, ... ) __attribute__ ((noreturn, format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:76:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void QDECL PrintMsg( gentity_t *ent, const char *fmt, ... ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:1010:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( string + stringlength, entry ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:55:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( remappedShaders[i].newShader,newShader ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:61:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( remappedShaders[remapCount].newShader,newShader ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:62:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( remappedShaders[remapCount].oldShader,oldShader ); data/iortcw-1.51.c+dfsg1/MP/code/null/null_main.c:39:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (error,argptr); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:405:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( cmd_args, cmd_argv[i] ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:430:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( cmd_args, cmd_argv[i] ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1206:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( out, in ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2055:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( b, s ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2543:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( &cl_cdkey[16], buffer ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2366:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buildBuffer[i].name, filename_inzip ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2457:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( zpath, zname ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2676:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( listbuf, pFiles[i] ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2895:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(listbuf, name); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2897:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(listbuf, description); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3263:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( pak->pakGamename, dir ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1480:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (newi, s); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1481:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (s, newi); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1521:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:213:23: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_vsnprintf vsnprintf data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:823:66: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseError( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:824:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseWarning( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:863:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int QDECL Com_sprintf (char *dest, int size, const char *fmt, ...) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:960:60: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. char * QDECL va(char *format, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:981:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int level, const char *error, ... ) __attribute__ ((noreturn, format(printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:982:71: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:191:117: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL NET_OutOfBandPrint( netsrc_t net_socket, netadr_t adr, const char *format, ...) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:773:87: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL FS_Printf( fileHandle_t f, const char *fmt, ... ) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:933:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:934:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:935:91: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int code, const char *fmt, ... ) __attribute__ ((noreturn, format(printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:1213:81: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Sys_Error( const char *error, ...) __attribute__ ((noreturn, format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2639:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( w->entityString, p ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2787:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(spawnVarChars + numSpawnVarChars, keyname); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2791:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(spawnVarChars + numSpawnVarChars, com_token); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:2205:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( image->imgName, name ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_jpg.c:43:17: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # error Need system libjpeg >= 80 or jpeg_mem_ support data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:66:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, name); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3831:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( textEnd, buffers[i] ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:2069:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( w->entityString, p ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1149:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( image->imgName, name ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_jpg.c:43:17: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # error Need system libjpeg >= 80 or jpeg_mem_ support data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:66:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, name); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_public.h:125:86: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (QDECL *Printf)( int printLevel, const char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_public.h:128:95: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (QDECL *Error)( int errorLevel, const char *fmt, ...) __attribute__ ((noreturn, format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:3094:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( textEnd, buffers[i] ); data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:400:94: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL SV_SendServerCommand( client_t *cl, const char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_bot.c:174:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void QDECL BotImport_Print(int type, char *fmt, ...) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1448:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( text, p ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1488:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(text, p); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:788:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( versionMap[ numVersions ].version, token ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:793:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( versionMap[ numVersions ].platform, token ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:803:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( versionMap[ numVersions ].installer, token ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:588:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( infostring, Cvar_InfoString( CVAR_SERVERINFO ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:607:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( status + statusLength, player ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1477:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( start, s ); // remove this part data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1545:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1584:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:197:23: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_vsnprintf vsnprintf data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:809:66: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseError( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:810:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseWarning( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:861:70: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void Com_ScriptError( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:862:72: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void Com_ScriptWarning( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:888:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int QDECL Com_sprintf (char *dest, int size, const char *fmt, ...) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:982:60: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. char * QDECL va(char *format, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:1011:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int level, const char *error, ... ) __attribute__ ((noreturn, format(printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:1012:71: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:564:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buff, events[i]->getParam() ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:581:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buff, events[i]->getParam() ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:405:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( newbuffer, m_data->data ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:430:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. void idStr::snprintf data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:149:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. static void snprintf( char *dst, int size, const char *fmt, ... ) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:149:96: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static void snprintf( char *dst, int size, const char *fmt, ... ) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:183:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:255:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:269:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:283:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:313:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:327:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( m_data->data, text.c_str() ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:408:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:445:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:452:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 1, 2))) void Sys_Warn( char *warning, ... ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:636:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stdout, Q3_VERSION " dedicated server (%s)\n", date ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:638:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stdout, Q3_VERSION " client (%s)\n", date ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:691:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp( execArgv[ 0 ], execArgv ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1042:10: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. ret = system( cmdline ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1049:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl( cmdline, cmdline, NULL ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1101:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( access( fn, X_OK ) == -1 ) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1106:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( access( fn, X_OK ) == -1 ) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1111:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( access( fn, X_OK ) == -1 ) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:350:8: [4] (shell) ShellExecute: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if ( !ShellExecute( NULL, "open", url, NULL, NULL, SW_RESTORE ) ) { data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:91:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (filename, "%s%s", filebase, fileinfo.name); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:126:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (text, error,argptr); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:129:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (text2, "%s\nGetLastError() = %i", text, err); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:150:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (error,argptr); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:167:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (format,argptr); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:185:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (text, format, argptr); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:231:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp, path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:280:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( writedir, gamedir ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:305:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (full, path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:308:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (full, path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:318:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( full, path ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:321:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (full, "%s%s", qdir, path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:331:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( full, path ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:334:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (full, "%s%s", gamedir, path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:347:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (archivename, "%s/%s", archivedir, path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:358:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (b, s); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:825:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (path, extension); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:835:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (temp,path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:836:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (path,basepath); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:837:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (path,temp); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:926:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (dest,src); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:233:10: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vprintf(fmt, vp); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:497:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( stderr, fmt, argptr ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:549:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( expanded, "%s_%i", sym, currentFileIndex ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:605:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( expanded, "%s_%i", sym, currentFileIndex ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:927:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, token ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1071:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, token ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1320:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( imageName, outputFilename ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1354:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( imageName, outputFilename ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1433:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( filename, asmFileNames[ i ] ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1496:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( expanded, filename ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1510:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( outputFilename, com_token ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1570:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( outputFilename, argv[ i+1 ] ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:41:75: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ( ( format ( printf, 1, 2 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:101:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( infos[count], info ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:167:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( filename, dirptr ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:328:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( filename, dirptr ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1287:75: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ( ( format ( printf, 1, 2 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5388:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( uiInfo.serverStatus.motd, va( "Wolf Multiplayer - Version: %s", Q3_VERSION ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:274:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &strPool[strPoolIndex], p ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:342:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void PC_SourceWarning(int handle, char *format, ...) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:365:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void PC_SourceError(int handle, char *format, ...) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3956:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( g_nameBind1, DC->translateString( " or " ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3957:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( g_nameBind1, g_nameBind2 ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:396:85: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (*Error)(int level, const char *error, ...) __attribute__ ((noreturn, format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:397:62: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (*Print)(const char *msg, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:398:63: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (*DPrint)(const char *msg, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:470:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( epair->key, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:478:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( epair->value, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:171:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ( *aasworld ).configstrings[i], configstrings[i] ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.h:43:62: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL AAS_Error(char *fmt, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:198:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ch->c[i].value.string, defaultch->c[i].value.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:223:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ch->filename, charfile ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:290:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ch->c[index].value.string, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:510:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( out->filename, ch1->filename ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:529:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( out->c[i].value.string, ch1->c[i].value.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:728:8: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( synonym->string, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:929:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( ptr, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:945:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( &ptr[strlen( ptr )], "%cr%s%c", ESCAPE_CHAR, token.string, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1043:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( random->string, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1071:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( randomstring->string, chatmessagestring ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1252:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( matchstring->string, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1587:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s->string, temp ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1839:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( namebuffer, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1847:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( key->string, namebuffer ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1859:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( key->string, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1889:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( chatmessage->chatmessage, chatmessagestring ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2046:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( chatmessage->chatmessage, chatmessagestring ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2235:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &outputbuf[len], temp ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2262:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &outputbuf[len], ptr ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2300:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( srcmessage, message ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2306:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( srcmessage, chatstate->chatmessage ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2533:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( match.string, message ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:367:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( config->weights[config->numweights].name, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/botlib.h:192:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (QDECL *Print)(int type, char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c:91:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v->name, var_name ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c:195:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v->string, value ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c:246:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( v->string, value ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.c:140:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( logfile.fp, fmt, ap ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.c:165:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( logfile.fp, fmt, ap ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.h:47:62: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Log_Write(char *fmt, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.h:49:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Log_WriteTimeStamped(char *fmt, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:483:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( t1->string, t2->string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:491:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( t1->string, &t2->string[1] ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:679:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( define->name, builtin[i].string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:721:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( token->string, source->scriptstack->filename ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:1191:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( define->name, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:1425:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( newdefine->name, define->name ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2727:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( token->string, newtoken.string + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2963:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( source->includepath, PATHSEPERATOR_STR ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:3175:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( pc_token->string, token.string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:3199:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( filename, sourceFiles[handle]->filename ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.h:153:82: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL SourceError(source_t *source, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.h:155:85: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL SourceWarning(source_t *source, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.h:257:82: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL ScriptError(script_t *script, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.h:259:84: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL ScriptWarning(script_t *script, char *str, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:128:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( targetName, S_COLOR_WHITE ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:235:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( attackerName, S_COLOR_WHITE ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1791:70: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL CG_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1792:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL CG_Error( const char *msg, ... ) __attribute__ ((noreturn, format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:827:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( translateStrings[i].localname, token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:57:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( systemChat, p ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:59:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( teamChat2, teamChat1 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:60:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( teamChat1, p ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:194:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( prevmap, curmap ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:317:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( bigConfigString, s ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:326:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( bigConfigString, s ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:1499:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( cinTable[currentHandle].fileName, name ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2011:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( cmd, Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3115:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( groupStr, Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3117:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( itemStr, Cmd_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3120:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( itemStr, Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3238:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void QDECL CL_RefPrintf( int print_level, const char *fmt, ...) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4886:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( cl.limboChatMsgs[i], cl.limboChatMsgs[i - 1] ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:348:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( string, "RECORDING %s: %ik", clc.demoName, pos / 1024 ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:387:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( string, "VoIP: [%s]", buffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:315:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (sfx->soundName, name); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:233:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ptr->filename, filename); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.h:612:81: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void AICast_Printf( int type, const char *fmt, ... ) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_debug.c:158:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( ent->classname, cmd ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:981:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, BotRandomOpponentName( bs ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:1247:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, BotRandomOpponentName( bs ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:635:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( buf, wp->name ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.h:231:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL BotAI_Print(int type, char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:467:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( pch, string ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:226:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat( char *strDestination, const char *strSource ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:255:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy( char *strDestination, const char *strSource ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:1958:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf( const char *buffer, const char *fmt, ... ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:87:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat( char *strDestination, const char *strSource ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:89:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy( char *strDestination, const char *strSource ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:107:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf( const char *buffer, const char *fmt, ... ) __attribute__ ((format (scanf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:107:80: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. int sscanf( const char *buffer, const char *fmt, ... ) __attribute__ ((format (scanf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_public.h:1746:78: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL BG_AnimParseError( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:80:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( string + stringlength, entry ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:958:72: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_LogPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:960:69: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_Printf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:961:70: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_DPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:962:78: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL G_Error( const char *fmt, ... ) __attribute__ ((noreturn, format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:75:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void QDECL PrintMsg( gentity_t *ent, const char *fmt, ... ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:808:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( string + stringlength, entry ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:55:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( remappedShaders[i].newShader,newShader ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:61:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( remappedShaders[remapCount].newShader,newShader ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:62:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( remappedShaders[remapCount].oldShader,oldShader ); data/iortcw-1.51.c+dfsg1/SP/code/null/null_main.c:39:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (error,argptr); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:406:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( cmd_args, cmd_argv[i] ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:431:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( cmd_args, cmd_argv[i] ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:886:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( out, in ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1606:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( b, s ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2092:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( &cl_cdkey[16], buffer ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2375:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buildBuffer[i].name, filename_inzip ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2466:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( zpath, zname ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2686:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( listbuf, pFiles[i] ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2904:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(listbuf, name); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2906:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(listbuf, description); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3284:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( pak->pakGamename, dir ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1576:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1615:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:210:23: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_vsnprintf vsnprintf data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:835:66: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseError( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:836:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseWarning( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:875:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int QDECL Com_sprintf (char *dest, int size, const char *fmt, ...) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:965:60: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. char * QDECL va(char *format, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:986:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int level, const char *error, ... ) __attribute__ ((noreturn, format(printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:987:71: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:192:117: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL NET_OutOfBandPrint( netsrc_t net_socket, netadr_t adr, const char *format, ...) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:734:87: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL FS_Printf( fileHandle_t f, const char *fmt, ... ) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:865:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:866:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:867:91: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int code, const char *fmt, ... ) __attribute__ ((noreturn, format(printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:1132:81: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Sys_Error( const char *error, ...) __attribute__ ((noreturn, format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2636:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( w->entityString, p ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2782:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(spawnVarChars + numSpawnVarChars, keyname); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2786:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(spawnVarChars + numSpawnVarChars, com_token); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:2201:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( image->imgName, name ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_jpg.c:43:17: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # error Need system libjpeg >= 80 or jpeg_mem_ support data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:66:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, name); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3951:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( textEnd, buffers[i] ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:2067:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( w->entityString, p ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1199:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( image->imgName, name ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_jpg.c:43:17: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. # error Need system libjpeg >= 80 or jpeg_mem_ support data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:66:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, name); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_public.h:125:86: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (QDECL *Printf)( int printLevel, const char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_public.h:128:95: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (QDECL *Error)( int errorLevel, const char *fmt, ...) __attribute__ ((noreturn, format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:3208:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( textEnd, buffers[i] ); data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:360:94: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL SV_SendServerCommand( client_t *cl, const char *fmt, ...) __attribute__ ((format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_bot.c:175:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void QDECL BotImport_Print(int type, char *fmt, ...) data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:190:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( savemap, map ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1465:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( text, p ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1505:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(text, p); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:589:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( infostring, Cvar_InfoString( CVAR_SERVERINFO ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:608:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( status + statusLength, player ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1477:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( start, s ); // remove this part data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1545:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1584:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( s, newi ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:194:23: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_vsnprintf vsnprintf data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:821:66: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseError( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:822:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseWarning( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:873:70: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void Com_ScriptError( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:874:72: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void Com_ScriptWarning( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:899:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int QDECL Com_sprintf (char *dest, int size, const char *fmt, ...) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:986:60: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. char * QDECL va(char *format, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:1015:92: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int level, const char *error, ... ) __attribute__ ((noreturn, format(printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:1016:71: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:564:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buff, events[i]->getParam() ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:581:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( buff, events[i]->getParam() ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:405:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( newbuffer, m_data->data ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:430:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. void idStr::snprintf data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:149:17: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. static void snprintf( char *dst, int size, const char *fmt, ... ) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:149:96: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static void snprintf( char *dst, int size, const char *fmt, ... ) __attribute__ ((format (printf, 3, 4))); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:183:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:255:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:269:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:283:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:313:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:327:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( m_data->data, text.c_str() ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:408:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:445:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( m_data->data, text ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:452:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 1, 2))) void Sys_Warn( char *warning, ... ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:636:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stdout, Q3_VERSION " dedicated server (%s)\n", date ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:638:4: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf( stdout, Q3_VERSION " client (%s)\n", date ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:691:3: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp( execArgv[ 0 ], execArgv ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1044:10: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. ret = system( cmdline ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1051:4: [4] (shell) execl: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execl( cmdline, cmdline, NULL ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1102:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( access( fn, X_OK ) == -1 ) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1107:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( access( fn, X_OK ) == -1 ) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1112:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ( access( fn, X_OK ) == -1 ) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:925:8: [4] (shell) ShellExecute: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if ( !ShellExecute( NULL, "open", url, NULL, NULL, SW_RESTORE ) ) { data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:91:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (filename, "%s%s", filebase, fileinfo.name); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:126:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (text, error,argptr); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:129:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (text2, "%s\nGetLastError() = %i", text, err); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:150:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (error,argptr); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:167:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (format,argptr); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:185:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (text, format, argptr); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:231:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp, path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:280:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( writedir, gamedir ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:305:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (full, path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:308:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (full, path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:318:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( full, path ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:321:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (full, "%s%s", qdir, path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:331:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( full, path ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:334:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (full, "%s%s", gamedir, path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:347:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (archivename, "%s/%s", archivedir, path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:358:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (b, s); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:825:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (path, extension); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:835:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (temp,path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:836:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (path,basepath); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:837:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (path,temp); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:926:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (dest,src); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:233:10: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vprintf(fmt, vp); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:497:2: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf( stderr, fmt, argptr ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:549:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( expanded, "%s_%i", sym, currentFileIndex ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:605:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( expanded, "%s_%i", sym, currentFileIndex ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:927:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, token ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1071:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, token ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1320:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( imageName, outputFilename ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1354:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( imageName, outputFilename ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1433:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( filename, asmFileNames[ i ] ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1496:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( expanded, filename ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1510:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( outputFilename, com_token ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1570:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( outputFilename, argv[ i+1 ] ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:41:75: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ( ( format ( printf, 1, 2 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:102:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( infos[count], info ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:166:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( filename, dirptr ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:290:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( filename, dirptr ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:946:75: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ( ( format ( printf, 1, 2 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1120:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( translateStrings[i].localname, token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:346:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( &strPool[strPoolIndex], p ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:415:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void PC_SourceWarning(int handle, char *format, ...) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:438:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. static __attribute__ ((format (printf, 2, 3))) void PC_SourceError(int handle, char *format, ...) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3904:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( g_nameBind1, va( " %s ", DC->getTranslatedString( "or" ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3905:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( g_nameBind1, g_nameBind2 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:394:85: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (*Error)(int level, const char *error, ...) __attribute__ ((noreturn, format (printf, 2, 3))); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:395:62: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (*Print)(const char *msg, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:396:63: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void (*DPrint)(const char *msg, ...) __attribute__ ((format (printf, 1, 2))); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.c:1966:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. n = ( *aasworld ).numareas * random(); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:821:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. weight = random() * syn->totalweight; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:970:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bot_randomlist_t *random; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:977:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( random = randomlist; random; random = random->next ) data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1000:46: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bot_randomlist_t *randomlist, *lastrandom, *random; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1048:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lastrandom->next = random; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1049:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { randomlist = random;} data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1050:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lastrandom = random; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1098:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bot_randomlist_t *random; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1102:32: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( random = randomstrings; random; random = random->next ) data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1105:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. i = random() * random->numstrings; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2356:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. n = random() * numchatmessages; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2591:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num = random() * numchatmessages; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_gen.c:86:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. index = random() * numranks; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:85:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float random; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:507:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. AAS_FloatForBSPEpairKey( ent, "random", &cs->random ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:683:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { return fs->minweight + random() * ( fs->maxweight - fs->minweight );} data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:690:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { w1 = fs->minweight + random() * ( fs->maxweight - fs->minweight );} data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:694:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { w2 = fs->next->minweight + random() * ( fs->next->maxweight - fs->next->minweight );} data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:761:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { return s->minweight + random() * ( s->maxweight - s->minweight );} data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:767:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { return s->minweight + random() * ( s->maxweight - s->minweight );} data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:785:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 0.01 ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:66:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = cg.time + 1000 + random() * 250; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:325:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorMA( le->pos.trBase, 2 + random() * 4, dir, le->pos.trBase ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:529:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = dir[0] * ( 0.75 + random() ) * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:530:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = dir[1] * ( 0.75 + random() ) * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:531:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = GIB_JUMP - 50 + dir[2] * ( 0.5 + random() ) * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:745:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = dir[0] * ( 0.5 + random() ) * GIB_VELOCITY * 0.3; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:746:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = dir[1] * ( 0.5 + random() ) * GIB_VELOCITY * 0.3; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:747:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = GIB_JUMP + dir[2] * ( 0.5 + random() ) * GIB_VELOCITY * 0.5; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:788:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = ( ( i % 2 ) * 2 - 1 ) * ( 40 + 40 * random() ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:789:63: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = ( ( ( i / 2 ) % 2 ) * 2 - 1 ) * ( 40 + 40 * random() ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:801:83: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace.endpos, velocity, random() * 360, data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:1486:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. pitchRecoilAdd = pow( random(),8 ) * ( 10 + VectorLength( cg.snap->ps.velocity ) / 5 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:317:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:332:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_SmokePuff( cent->lerpOrigin, dir, 15 + ( random() * 10 ), data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:340:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:351:46: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_SmokePuff( cent->lerpOrigin, dir, 40 + random() * 70, //40+(rnd*40), data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:1639:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. angles[ROLL] = random() * 90; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:957:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = ( le->startTime + 5000 + random() * 5000 ) + endtime; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1044:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1045:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1046:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 200 ) + 200; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1051:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1052:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1055:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = random() * 200 * materialmul; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1057:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = random() * 20; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1108:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.burnMarkShader, origin, dir, random() * 360, 1,1,1,1, qfalse, 64, qfalse, INT_MAX ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1140:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 3000; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1203:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 5000; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1282:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1283:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1285:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 200 ) + 100; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1287:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 100 ) + 50; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1314:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 5000; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1335:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1336:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1338:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 100 ) + 50; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_localents.c:228:94: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace->endpos, trace->plane.normal, random() * 360, data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:766:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:773:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:2053:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rndSize = 0.4 + random() * 0.6; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:2270:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p->vel[2] = random() * 6; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:2430:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p->vel[2] = random() * 20; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:1995:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ci->breathPuffTime = cg.time + 3000 + random() * 1000; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1011:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() * voiceChatList->voiceChats[i].numSounds; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c:50:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. qboolean random; // TODO data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:101:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = 200 + 50 * random(); // JPW NERVE data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:105:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + cg_brassTime.integer + ( cg_brassTime.integer / 4 ) * random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:189:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + cg_brassTime.integer + ( cg_brassTime.integer / 4 ) * random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:240:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = 200 + 50 * random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:322:88: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + ( cg_brassTime.integer * 8 ) + ( cg_brassTime.integer * random() ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:418:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dir[0] = random() * 0.25; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:420:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dir[2] = random(); // one direction (so smoke goes side-like) data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:461:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:571:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:2234:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.lightningHitWallShader, cent->pe.teslaEndPoints[i], vec, random() * 360, 0.2, 0.2, 0.2, 1.0, qtrue, 4, qfalse, 300 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:2240:155: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_DynamicLightningBolt( cgs.media.lightningBoltShader, tagPos, cent->pe.teslaEndPoints[i], 1+((cg.time%((i+2)*(i+3)))+i)%2, 20 + (float)(i%3)*5 + 6.0*random(), qtrue, 1.0, 0, i*i*3 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4441:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. pitchRecoilAdd = pow( random(),8 ) * ( 10 + VectorLength( cg.snap->ps.velocity ) / 5 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4635:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + duration - (int)( 0.5 * random() * duration ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4643:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorMA( le->pos.trBase, 2 + random() * 4, dir, le->pos.trBase ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4704:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorMA( pos, 2 + random() * 4, dir, pos ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4731:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dir[1] * crandom() * speed * randScale, dir[2] * random() * speed ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4771:121: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet( unitvel, dir[0] + crandom() * 0.9, dir[1] + crandom() * 0.9, fabs( dir[2] ) > 0.5 ? dir[2] * ( 0.2 + 0.8 * random() ) : random() * 0.6 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4771:134: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet( unitvel, dir[0] + crandom() * 0.9, dir[1] + crandom() * 0.9, fabs( dir[2] ) > 0.5 ? dir[2] * ( 0.2 + 0.8 * random() ) : random() * 0.6 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4787:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. timeAdd = 10.0 + random() * 40.0; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4795:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->effectWidth = 5 + random() * 5; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5222:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5227:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 600, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5240:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5252:68: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ParticleExplosion( "blacksmokeanim", sprOrg, sprVel, 6000 + random() * 2000, 40, 400 + random() * 200 ); // JPW NERVE was blacksmokeanimb data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5252:95: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ParticleExplosion( "blacksmokeanim", sprOrg, sprVel, 6000 + random() * 2000, 40, 400 + random() * 200 ); // JPW NERVE was blacksmokeanimb data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5260:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( sprVel,random() * 100 + 300,sprVel ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5261:87: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ParticleExplosion( "explode1", sprOrg, sprVel, 1000 + rand() % 1450, 40, 400 + random() * 200 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5264:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5427:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5432:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 600, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5445:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5450:71: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ParticleExplosion( "explode1", sprOrg, sprVel, 1600, 20, 200 + random() * 400 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5461:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5542:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( mark, origin, dir, random() * 360, 1,1,1,1, alphaFade, radius, qfalse, -1 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5624:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( mark, origin, dir, random() * 360, 1,1,1,1, alphaFade, radius, qfalse, INT_MAX ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:5922:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. begin = 50 + random() * ( len - 60 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6050:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !wolfkick && random() < cg_tracerChance.value ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6091:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6092:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( smokedir,25.0 + random() * 25,tmpv ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6112:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6113:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( smokedir,-35.0 + random() * 25,tmpv ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6150:94: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace.endpos, trace.plane.normal, random() * 360, data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6151:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 1,1,1,1, qtrue, 15 + random() * 20, qfalse, cg_bloodTime.integer * 1000 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6160:95: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace.endpos, trace.plane.normal, random() * 360, data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:6161:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 1,1,1,1, qtrue, 15 + random() * 10, qfalse, cg_bloodTime.integer * 1000 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_fight.c:1321:42: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( ( cs->attributes[CAMPER] < random() ) data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_fight.c:1326:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( cs->attributes[TACTICAL] > 0.3 + random() * 0.5 ) data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_fight.c:1861:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( cs->attributes[TACTICAL] > 0.11 + random() * 0.5 ) && data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:121:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. vec[YAW] = random() * 360.0; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:1103:87: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->bs->ideal_viewangles[YAW] = AngleMod( cs->bs->ideal_viewangles[YAW] + ( 45.0 + random() * 45.0 ) * ( 2 * ( rand() % 2 ) - 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:2021:88: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->bs->ideal_viewangles[YAW] = AngleMod( cs->bs->ideal_viewangles[YAW] + ( 45.0 + random() * 45.0 ) * ( 2 * ( rand() % 2 ) - 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:3613:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->bs->ideal_viewangles[PITCH] += 15 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:3630:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->bs->ideal_viewangles[PITCH] += -10 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:4353:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. && cs->attributes[AGGRESSION] < ( random() + 0.5 * cs->attributes[TACTICAL] ) data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_funcs.c:4539:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( random() * 3.0 + 1.0 < cs->attributes[ATTACK_CROUCH] ) data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_ents.c:164:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:247:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. count = random() * numopponents; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:310:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() * 8.9; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:386:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:429:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:473:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:512:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:568:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:616:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->botdeathtype == MOD_BFG_SPLASH ) && random() < 0.5 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:636:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < trap_Characteristic_BFloat( bs->character, CHARACTERISTIC_CHAT_INSULT, 0, 1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:672:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:707:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < trap_Characteristic_BFloat( bs->character, CHARACTERISTIC_CHAT_INSULT, 0, 1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:743:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:798:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd * 0.5 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:854:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd * 0.5 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:906:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd * 0.5 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:962:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > bs->thinktime * 0.1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:966:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:969:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.25 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:986:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < trap_Characteristic_BFloat( bs->character, CHARACTERISTIC_CHAT_MISC, 0, 1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:426:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > (float ) 1.0 / ( NumPlayersOnSameTeam( bs ) - 1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:561:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:607:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:647:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:729:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:766:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:796:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:821:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:848:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1385:50: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->leadmessage_time = -( trap_AAS_Time() + 2 * random() ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1415:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:393:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * croucher ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:415:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < bs->thinktime * 0.3 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:427:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:502:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->defendaway_time = trap_AAS_Time() + 2 + 5 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:591:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:601:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * croucher ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:725:56: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->rushbaseaway_time = trap_AAS_Time() + 5 + 10 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:958:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->respawn_time = trap_AAS_Time() + 1 + random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1083:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1218:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1329:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1406:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1420:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1501:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 0.2 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:198:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:200:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:936:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { bs->teamgoal_time = 120 + 180 * camper + random() * 15;} data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:975:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > camper ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1057:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r1 = random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1060:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r2 = random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1064:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bestorg[0] += sign * 700 * random() + 50; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1068:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r2 = random(); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1072:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bestorg[1] += sign * 700 * random() + 50; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1075:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bestorg[2] += 3 * 48 * random() - 2 * 48 - 1; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1156:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < jumper ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1160:60: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( bs->attackcrouch_time < trap_AAS_Time() - 1 && random() < croucher ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1208:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.935 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1227:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.9 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1616:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1855:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > firethrottle ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2481:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet( angles, 0, 360 * random(), 0 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2544:64: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( m.type == CMS_CHAT && m.time > trap_AAS_Time() - ( 1 + random() ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2599:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 1.5 / ( NumBots() + 1 ) && random() < chat_reply ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2599:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 1.5 / ( NumBots() + 1 ) && random() < chat_reply ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1168:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( (unsigned)time( NULL ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:525:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->askteamleader_time = trap_AAS_Time() + 5 + random() * 10; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:527:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->becometeamleader_time = trap_AAS_Time() + 5 + random() * 10; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:535:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->becometeamleader_time = trap_AAS_Time() + 15 + random() * 10; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:830:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void srand( unsigned seed ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:82:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void srand( unsigned seed ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_active.c:903:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. muzzlebounce[PITCH] -= 0.25 * random() * ( 1.0f - ( level.time - client->sniperRifleFiredTime ) / RIFLE_SHAKE_TIME ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_active.c:940:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] += 50 + random() * 35; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:228:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num = random() * ( num - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:2108:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. launchvel[2] = 10 + random() * 10; data/iortcw-1.51.c+dfsg1/MP/code/game/g_combat.c:341:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. launchvel[2] = random(); data/iortcw-1.51.c+dfsg1/MP/code/game/g_combat.c:422:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. launchvel[2] = 10 + random() * 10; data/iortcw-1.51.c+dfsg1/MP/code/game/g_combat.c:437:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.5 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_combat.c:443:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.5 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_combat.c:842:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( (int)( random() + 0.5 ) ) { // choose one of two possible replacements data/iortcw-1.51.c+dfsg1/MP/code/game/g_items.c:492:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. quantity = ( random() * ( ent->item->quantity - 1 ) ) + 1; // giving 1-<item default count> data/iortcw-1.51.c+dfsg1/MP/code/game/g_items.c:860:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_items.c:861:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. respawn += crandom() * ent->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_items.c:1256:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:300:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1106:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( randomSeed ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:301:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.mins, tv( -( ent->random ), -( ent->random ), -( ent->random ) ), ent->r.mins ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:301:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.mins, tv( -( ent->random ), -( ent->random ), -( ent->random ) ), ent->r.mins ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:301:75: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.mins, tv( -( ent->random ), -( ent->random ), -( ent->random ) ), ent->r.mins ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:302:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.maxs, tv( ent->random, ent->random, ent->random ), ent->r.maxs ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:302:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.maxs, tv( ent->random, ent->random, ent->random ), ent->r.maxs ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:302:62: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.maxs, tv( ent->random, ent->random, ent->random ), ent->r.maxs ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:767:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. deg = crandom() * ent->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:770:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. deg = crandom() * ent->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:826:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !ent->random ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:831:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->random = sin( M_PI * ent->random / 180 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:964:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.angles2[0] = ent->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:976:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:977:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.time2 = ent->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c:1470:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = crandom() * self->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c:1471:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. u = crandom() * self->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c:1645:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = random() * M_PI * 2.0f; data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c:1656:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. scale = 555 + random() * 1800; data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c:1658:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. scale = 1200 + random() * 2500; data/iortcw-1.51.c+dfsg1/MP/code/game/g_mover.c:3160:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( vec, random() * (float)self->radius, bat->movedir ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:1290:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( level.time > self->random && has_moved ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:4095:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:4096:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rval = ent->random * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:4123:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:4124:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rval = ent->random * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:119:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. {"random", FOFS( random ), F_FLOAT}, data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:110:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:234:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:260:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.clientNum = ent->random * 10; data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:1019:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dayaw = ent->random; data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:1106:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !( self->random ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:63:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:184:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:186:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random >= ent->wait && ent->wait >= 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:586:73: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. self->nextthink = level.time + 1000 * ( self->wait + crandom() * self->random ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:603:38: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "1", &self->random ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:609:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( self->random >= self->wait ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:829:41: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bomb->nextthink = level.time + 1000 + random() * 300; data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:847:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( tmpdir,500 + random() * 500,tmpdir ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:1442:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. damage = G_GetWeaponDamage( WP_SILENCER ) + ( random() * 15 ); // JPW giving 40-55 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2370:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *env = getenv(arg1); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2705:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2707:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:744:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define random() ( ( rand() & 0x7fff ) / ( (float)0x7fff ) ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:745:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define crandom() ( 2.0 * ( random() - 0.5 ) ) data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:730:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define random() ( ( rand() & 0x7fff ) / ( (float)0x7fff ) ) data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:731:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define crandom() ( 2.0 * ( random() - 0.5 ) ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_loadlib.h:26:37: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. # define Sys_LoadLibrary(f) (void*)LoadLibrary(f) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:73:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p1 = getenv( "HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:87:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p1 = getenv( "XDG_DATA_HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:92:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if( ( p2 = getenv( "HOME" ) ) != NULL) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:105:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p1 = getenv( "HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:133:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p = getenv( "HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:798:37: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *session = getenv( "DESKTOP_SESSION" ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:891:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* term = getenv( "TERM" ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:103:21: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. HMODULE shfolder = LoadLibrary("shfolder.dll"); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:327:8: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if ( !CreateProcess( NULL, va( "%s\\%s", szPathOrig, exeName ), NULL, NULL,FALSE, 0, NULL, NULL, &si, &pi ) ) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:327:8: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if ( !CreateProcess( NULL, va( "%s\\%s", szPathOrig, exeName ), NULL, NULL,FALSE, 0, NULL, NULL, &si, &pi ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.c:1987:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. n = ( *aasworld ).numareas * random(); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:821:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. weight = random() * syn->totalweight; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:970:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bot_randomlist_t *random; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:977:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( random = randomlist; random; random = random->next ) data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1000:46: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bot_randomlist_t *randomlist, *lastrandom, *random; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1048:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lastrandom->next = random; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1049:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { randomlist = random;} data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1050:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. lastrandom = random; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1098:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bot_randomlist_t *random; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1102:32: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. for ( random = randomstrings; random; random = random->next ) data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1105:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. i = random() * random->numstrings; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2356:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. n = random() * numchatmessages; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2591:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num = random() * numchatmessages; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_gen.c:86:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. index = random() * numranks; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:85:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float random; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:507:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. AAS_FloatForBSPEpairKey( ent, "random", &cs->random ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:683:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { return fs->minweight + random() * ( fs->maxweight - fs->minweight );} data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:690:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { w1 = fs->minweight + random() * ( fs->maxweight - fs->minweight );} data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:694:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { w2 = fs->next->minweight + random() * ( fs->next->maxweight - fs->next->minweight );} data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:761:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { return s->minweight + random() * ( s->maxweight - s->minweight );} data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:767:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { return s->minweight + random() * ( s->maxweight - s->minweight );} data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:785:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 0.01 ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:495:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:502:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:67:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = cg.time + 1000 + random() * 250; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:301:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + duration - (int)( 0.5 * random() * duration ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:309:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorMA( le->pos.trBase, 2 + random() * 4, dir, le->pos.trBase ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:522:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = dir[0] * ( 0.75 + random() ) * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:523:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = dir[1] * ( 0.75 + random() ) * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:524:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = GIB_JUMP - 50 + dir[2] * ( 0.5 + random() ) * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:737:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = dir[0] * ( 0.5 + random() ) * GIB_VELOCITY * 0.3; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:738:35: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = dir[1] * ( 0.5 + random() ) * GIB_VELOCITY * 0.3; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:739:46: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = GIB_JUMP + dir[2] * ( 0.5 + random() ) * GIB_VELOCITY * 0.5; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:750:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size = 0.6 + 0.4 * random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:813:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = GIB_JUMP + random() * GIB_VELOCITY; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:815:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = dir[0] * ( 0.5 + random() ) * GIB_VELOCITY * 0.3; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:816:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = dir[1] * ( 0.5 + random() ) * GIB_VELOCITY * 0.3; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:817:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = GIB_JUMP + dir[2] * ( 0.5 + random() ) * GIB_VELOCITY * 0.5; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:824:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size = 0.6 + 0.4 * random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:921:54: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[0] = ( ( i % 2 ) * 2 - 1 ) * ( 40 + 40 * random() ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:922:62: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[1] = ( ( ( i / 2 ) % 2 ) * 2 - 1 ) * ( 40 + 40 * random() ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:934:82: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace.endpos, velocity, random() * 360, data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:1633:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. pitchRecoilAdd = pow( random(),8 ) * ( 10 + VectorLength( cg.snap->ps.velocity ) / 5 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:182:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. velocity[2] = FLY_JUMP - 50 + dir[2] * ( 0.5 + random() ) * FLY_VELOCITY; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:1894:19: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. angles[ROLL] = random() * 90; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:996:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = ( le->startTime + 5000 + random() * 5000 ) + endtime; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1004:42: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 7000 + random() * 5000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1092:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1093:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1094:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 200 ) + 200; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1099:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1100:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1103:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = random() * 200 * materialmul; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1105:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = random() * 20; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1169:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.burnMarkShader, origin, dir, random() * 360, 1,1,1,1, qfalse, 64, qfalse, -1 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1197:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.burnMarkShader, origin, dir, random() * 360, 1,1,1,1, qfalse, 64, qfalse, INT_MAX ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1229:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 3000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1292:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 5000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1371:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1372:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1374:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 200 ) + 100; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1376:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 100 ) + 50; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1403:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 5000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1424:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[0] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1425:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[1] += ( ( random() * 100 ) - 50 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1427:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->pos.trDelta[2] = ( random() * 100 ) + 50; // randomize sort of a lot so they don't all land together data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1485:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. qboolean random; // TODO data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_localents.c:228:94: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace->endpos, trace->plane.normal, random() * 360, data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:686:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:693:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:2149:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rndSize = 0.4 + random() * 0.6; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:2371:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p->vel[2] = random() * 6; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:2536:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p->vel[2] = random() * 20; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:2454:74: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.headLookStopTime = cg.time + (int)( stopTime * ( 0.5 + 0.5 * random() ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:2737:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ci->breathPuffTime = cg.time + 3000 + random() * 1000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3277:65: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRotationTimes[i] = minRotationTime + ( random() * ( maxRotationTime - minRotationTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3278:71: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRadiusCycleTimes[i] = minRadiusCycleTime + ( random() * ( maxRadiusCycleTime - minRadiusCycleTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3306:65: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRotationTimes[i] = minRotationTime + ( random() * ( maxRotationTime - minRotationTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3307:71: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRadiusCycleTimes[i] = minRadiusCycleTime + ( random() * ( maxRadiusCycleTime - minRadiusCycleTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3475:115: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.nextZombieSpiritSound = cg.time + sndIntervalMin + (int)( (float)( sndIntervalMax - sndIntervalMin ) * random() ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3521:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( re->axis[0], 150 + 50 * random(), le->pos.trDelta ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3798:112: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_DynamicLightningBolt( cgs.media.lightningBoltShader, tagPos, cent->pe.lightningPoints[i], 1, 25 + 12.0 * random(), ( cent->currentState.eFlags & EF_MONSTER_EFFECT ) == 0, 1.0, 0, i * i * 2 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:3893:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. colTake = 0.5 + random() * 0.5; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4009:65: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRotationTimes[i] = minRotationTime + ( random() * ( maxRotationTime - minRotationTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4010:71: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRadiusCycleTimes[i] = minRadiusCycleTime + ( random() * ( maxRadiusCycleTime - minRadiusCycleTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4038:65: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRotationTimes[i] = minRotationTime + ( random() * ( maxRotationTime - minRotationTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4039:71: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.zombieSpiritRadiusCycleTimes[i] = minRadiusCycleTime + ( random() * ( maxRadiusCycleTime - minRadiusCycleTime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4208:115: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cent->pe.nextZombieSpiritSound = cg.time + sndIntervalMin + (int)( (float)( sndIntervalMax - sndIntervalMin ) * random() ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:5020:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ci->blinkTime = cg.time + 500 + random() * 4000; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:110:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + cg_brassTime.integer + ( cg_brassTime.integer / 4 ) * random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:197:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + cg_brassTime.integer + ( cg_brassTime.integer / 4 ) * random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:299:88: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + ( cg_brassTime.integer * 8 ) + ( cg_brassTime.integer * random() ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:437:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:439:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dir[0] = random() * 0.25; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:441:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dir[2] = random(); // one direction (so smoke goes side-like) data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:536:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:2323:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.lightningHitWallShader, cent->pe.teslaEndPoints[i], vec, random() * 360, 0.2, 0.2, 0.2, 1.0, qtrue, 4, qfalse, 300 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:2329:187: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_DynamicLightningBolt( cgs.media.lightningBoltShader, tagPos, cent->pe.teslaEndPoints[i], 1 + ( ( cg.time % ( ( i + 2 ) * ( i + 3 ) ) ) + i ) % 2, 20 + (float)( i % 3 ) * 5 + 6.0 * random(), ( cent->pe.teslaEnemy[i] < 0 ), 1.0, 0, i * i * 3 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4633:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. pitchRecoilAdd = pow( random(),8 ) * ( 10 + VectorLength( cg.snap->ps.velocity ) / 5 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4815:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + duration - (int)( 0.5 * random() * duration ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4823:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorMA( le->pos.trBase, 2 + random() * 4, dir, le->pos.trBase ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4884:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorMA( pos, 2 + random() * 4, dir, pos ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4911:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. dir[1] * crandom() * speed * randScale, dir[2] * random() * speed ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4934:121: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet( unitvel, dir[0] + crandom() * 0.9, dir[1] + crandom() * 0.9, fabs( dir[2] ) > 0.5 ? dir[2] * ( 0.2 + 0.8 * random() ) : random() * 0.6 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4934:134: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet( unitvel, dir[0] + crandom() * 0.9, dir[1] + crandom() * 0.9, fabs( dir[2] ) > 0.5 ? dir[2] * ( 0.2 + 0.8 * random() ) : random() * 0.6 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4950:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. timeAdd = 10.0 + random() * 40.0; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4958:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->effectWidth = 5 + random() * 5; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5352:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. sprOrg[2] = origin[2] + 32 * random(); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5370:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 300, // speed data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5483:70: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ParticleExplosion( "explode1", sprOrg, sprVel, 1600, 20, 200 + random() * 400 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5492:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 400 + random() * 200, // speed data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5557:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( mark, origin, dir, random() * 360, 1,1,1,1, alphaFade, radius, qfalse, -1 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5639:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( mark, origin, dir, random() * 360, 1,1,1,1, alphaFade, radius, qfalse, INT_MAX ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5905:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. begin = 50 + random() * ( len - 60 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:5988:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !wolfkick && random() < cg_tracerChance.value ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:6043:94: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace.endpos, trace.plane.normal, random() * 360, data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:6044:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 1,1,1,1, qtrue, 15 + random() * 20, qfalse, cg_bloodTime.integer * 1000 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:6053:95: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodDotShaders[rand() % 5], trace.endpos, trace.plane.normal, random() * 360, data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:6054:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 1,1,1,1, qtrue, 15 + random() * 10, qfalse, cg_bloodTime.integer * 1000 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_fight.c:1413:42: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( ( cs->attributes[CAMPER] < random() ) data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_fight.c:1418:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( cs->attributes[TACTICAL] > 0.3 + random() * 0.5 ) data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_fight.c:2009:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( cs->attributes[TACTICAL] > 0.11 + random() * 0.5 ) && data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_func_boss1.c:763:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( enemyVec, 2.0 * ( 0.6 + 0.5 * random() ) * scale * ( 0.6 + 0.6 * ( 1.0 - ( enemyDist / HEINRICH_STOMP_RANGE ) ) ), enemyVec ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:121:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. vec[YAW] = random() * 360.0; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:1308:79: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->ideal_viewangles[YAW] = AngleMod( cs->ideal_viewangles[YAW] + ( 45.0 + random() * 45.0 ) * ( 2 * ( rand() % 2 ) - 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:2237:80: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->ideal_viewangles[YAW] = AngleMod( cs->ideal_viewangles[YAW] + ( 45.0 + random() * 45.0 ) * ( 2 * ( rand() % 2 ) - 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:3945:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->ideal_viewangles[PITCH] += 15 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:3962:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cs->ideal_viewangles[PITCH] += -10 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:4702:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. && cs->attributes[AGGRESSION] < ( random() + 0.5 * cs->attributes[TACTICAL] ) data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_funcs.c:4918:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ( random() * 3.0 + 1.0 < cs->attributes[ATTACK_CROUCH] ) data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_ents.c:164:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:247:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. count = random() * numopponents; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:310:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() * 8.9; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:386:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:429:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:473:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:512:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:568:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:616:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->botdeathtype == MOD_BFG_SPLASH ) && random() < 0.5 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:636:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < trap_Characteristic_BFloat( bs->character, CHARACTERISTIC_CHAT_INSULT, 0, 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:672:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:707:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < trap_Characteristic_BFloat( bs->character, CHARACTERISTIC_CHAT_INSULT, 0, 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:743:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:798:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd * 0.5 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:854:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd * 0.5 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:906:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd * 0.5 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:962:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > bs->thinktime * 0.1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:966:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > rnd ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:969:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.25 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:986:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < trap_Characteristic_BFloat( bs->character, CHARACTERISTIC_CHAT_MISC, 0, 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:426:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > (float ) 1.0 / ( NumPlayersOnSameTeam( bs ) - 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:561:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:607:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:647:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:729:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:766:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:796:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:821:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:848:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1385:50: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->leadmessage_time = -( trap_AAS_Time() + 2 * random() ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1415:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:393:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * croucher ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:415:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < bs->thinktime * 0.3 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:427:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:502:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->defendaway_time = trap_AAS_Time() + 2 + 5 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:591:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:601:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * croucher ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:725:56: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->rushbaseaway_time = trap_AAS_Time() + 5 + 10 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:958:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->respawn_time = trap_AAS_Time() + 1 + random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1083:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1218:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1329:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1406:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1420:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else if ( random() < bs->thinktime * 0.8 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1501:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 0.2 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:198:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = trap_AAS_Time() + 2 * random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:200:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:934:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else { bs->teamgoal_time = 120 + 180 * camper + random() * 15;} data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:973:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > camper ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1055:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r1 = random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1058:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r2 = random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1062:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bestorg[0] += sign * 700 * random() + 50; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1066:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r2 = random(); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1070:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bestorg[1] += sign * 700 * random() + 50; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1073:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bestorg[2] += 3 * 48 * random() - 2 * 48 - 1; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1154:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < jumper ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1158:60: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if ( bs->attackcrouch_time < trap_AAS_Time() - 1 && random() < croucher ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1206:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.935 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1225:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.9 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1610:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > 0.1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1848:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() > firethrottle ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2474:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet( angles, 0, 360 * random(), 0 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2537:64: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( m.type == CMS_CHAT && m.time > trap_AAS_Time() - ( 1 + random() ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2592:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 1.5 / ( NumBots() + 1 ) && random() < chat_reply ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2592:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < 1.5 / ( NumBots() + 1 ) && random() < chat_reply ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1170:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( (unsigned)time( NULL ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:525:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->askteamleader_time = trap_AAS_Time() + 5 + random() * 10; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:527:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->becometeamleader_time = trap_AAS_Time() + 5 + random() * 10; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:535:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->becometeamleader_time = trap_AAS_Time() + 15 + random() * 10; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:701:9: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void srand( unsigned seed ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:82:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void srand( unsigned seed ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_active.c:914:63: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. muzzlebounce[PITCH] -= 0.25*client->sniperRifleMuzzlePitch*random() * ( 1.0f - ( level.time - client->sniperRifleFiredTime ) / RIFLE_SHAKE_TIME ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:229:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num = random() * ( num - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_combat.c:464:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. launchvel[2] = 10 + random() * 10; data/iortcw-1.51.c+dfsg1/SP/code/game/g_combat.c:860:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( (int)( random() + 0.5 ) ) { // choose one of two possible replacements data/iortcw-1.51.c+dfsg1/SP/code/game/g_items.c:419:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. quantity = ( random() * ( ammoTable[weapon].maxclip - 4 ) ) + 4; // giving 4-<item default count> data/iortcw-1.51.c+dfsg1/SP/code/game/g_items.c:795:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_items.c:796:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. respawn += crandom() * ent->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_items.c:1169:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:301:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1186:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( randomSeed ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:310:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.mins, tv( -( ent->random ), -( ent->random ), -( ent->random ) ), ent->r.mins ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:310:57: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.mins, tv( -( ent->random ), -( ent->random ), -( ent->random ) ), ent->r.mins ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:310:75: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.mins, tv( -( ent->random ), -( ent->random ), -( ent->random ) ), ent->r.mins ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:311:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.maxs, tv( ent->random, ent->random, ent->random ), ent->r.maxs ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:311:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.maxs, tv( ent->random, ent->random, ent->random ), ent->r.maxs ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:311:62: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorAdd( ent->r.maxs, tv( ent->random, ent->random, ent->random ), ent->r.maxs ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:797:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. deg = crandom() * ent->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:800:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. deg = crandom() * ent->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:854:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !ent->random ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:859:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->random = sin( M_PI * ent->random / 180 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:993:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.angles2[0] = ent->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:1005:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:1006:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.time2 = ent->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_missile.c:1330:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = crandom() * self->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_missile.c:1331:24: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. u = crandom() * self->random; data/iortcw-1.51.c+dfsg1/SP/code/game/g_mover.c:3180:22: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorScale( vec, random() * (float)self->radius, bat->movedir ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_mover.c:3220:54: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. self->nextthink = level.time + (int)( ( 1.5 + 2.0 * random() ) * ( self->wait * 1000 ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:1306:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( level.time > self->random && has_moved ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:4059:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:4060:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rval = ent->random * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:4090:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:4091:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rval = ent->random * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:120:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. {"random", FOFS( random ), F_FLOAT}, data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:110:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:234:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:260:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.clientNum = ent->random * 10; data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:697:84: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. trap_SetConfigstring( CS_FOGVARS, va( "%f %f %f %f %f %f %i", ent->accuracy, ent->random, 1.0f, (float)ent->dl_color[0], (float)ent->dl_color[1], (float)ent->dl_color[2], ent->s.time ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:1098:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !( self->random ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:63:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:184:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:186:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random >= ent->wait && ent->wait >= 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:599:73: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. self->nextthink = level.time + 1000 * ( self->wait + crandom() * self->random ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:616:38: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "1", &self->random ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:622:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( self->random >= self->wait ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1921:15: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *env = getenv(arg1); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2268:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(seed); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2270:3: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(NULL)); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:758:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define random() ( ( rand() & 0x7fff ) / ( (float)0x7fff ) ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:759:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define crandom() ( 2.0 * ( random() - 0.5 ) ) data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:744:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define random() ( ( rand() & 0x7fff ) / ( (float)0x7fff ) ) data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:745:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define crandom() ( 2.0 * ( random() - 0.5 ) ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_loadlib.h:26:37: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. # define Sys_LoadLibrary(f) (void*)LoadLibrary(f) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:73:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p1 = getenv( "HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:87:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p1 = getenv( "XDG_DATA_HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:92:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. else if( ( p2 = getenv( "HOME" ) ) != NULL) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:105:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p1 = getenv( "HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:133:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if( ( p = getenv( "HOME" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:798:37: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *session = getenv( "DESKTOP_SESSION" ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:891:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* term = getenv( "TERM" ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:103:21: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. HMODULE shfolder = LoadLibrary("shfolder.dll"); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:904:8: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if ( !CreateProcess( NULL, va( "%s\\%s", szPathOrig, exeName ), NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi ) ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:904:8: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. if ( !CreateProcess( NULL, va( "%s\\%s", szPathOrig, exeName ), NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi ) ) data/iortcw-1.51.c+dfsg1/MP/code/asm/snapvector.c:31:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char ssemask[16] __attribute__((aligned(16))) = data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:181:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( trace, &enttrace, sizeof( bsp_trace_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:336:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:342:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *value = atoi( buf ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:521:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bspworld.dentdata, botimport.BSPEntityData(), bspworld.entdatasize ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_debug.c:259:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bboxcorners[4], bboxcorners[0], sizeof( vec3_t ) * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_debug.c:685:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &reach, &( *aasworld ).reachability[settings->firstreachablearea + index], sizeof( aas_reachability_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_def.h:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_def.h:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_def.h:246:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *configstrings[MAX_CONFIGSTRINGS]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_entity.c:180:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( info, &( *defaultaasworld ).entities[entnum].i, sizeof( aas_entityinfo_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_file.c:414:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ( *aasworld ).bspchecksum = atoi( LibVarGetString( "sv_mapChecksum" ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[1024]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:170:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( *aasworld ).configstrings[i] = (char *) GetMemory( strlen( configstrings[i] ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aasfile[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char this_mapname[MAPNAME_LEN], intstr[4]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_optimize.c:169:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( optface, face, sizeof( aas_face_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_optimize.c:203:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( optarea, area, sizeof( aas_area_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:2602:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[MAX_EPAIRKEY], targetname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:2603:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:2621:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). AAS_BSPModelMinsMaxsOrigin( atoi( model + 1 ), angles, mins, maxs, origin ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:2655:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). AAS_BSPModelMinsMaxsOrigin( atoi( model + 1 ), angles, mins, maxs, origin ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:2758:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_EPAIRKEY], classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:2784:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:3133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:3161:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:3368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[MAX_EPAIRKEY], targetname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:3369:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:3391:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_reach.c:3847:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.c:950:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.c:1110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.c:1886:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( reach, &( *aasworld ).reachability[num], sizeof( aas_reachability_t ) );; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_route.c:2170:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( *aasworld ).areavisibility[i], buf, size ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routetable.c:255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routetable.c:515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routetable.c:809:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( area_parents[i]->visibleParents, visibleParents, area_parents[i]->numVisibleParents * sizeof( unsigned short int ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_routetable.c:1195:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char destVisLookup[MAX_PARENTS]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_CHATTYPE_NAME]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; //name of the bot data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatmessage[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:200:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:593:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:888:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str1, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:937:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( &ptr[strlen( ptr )], "%cv%ld%c", ESCAPE_CHAR, token.intvalue, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1763:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatmessagestring[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1764:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuffer[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1944:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatmessagestring[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcmessage[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2603:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bestmatch, &match, sizeof( bot_match_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.h:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_MESSAGE_SIZE]; //message data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.h:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_gen.c:123:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( rankings, ranks, sizeof( float ) * numranks ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[32]; //classname of the item data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; //name of the item data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; //model of the item data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:676:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:1007:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:1038:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &gs->goalstack[gs->goalstacktop], goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:1088:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &gs->goalstack[gs->goalstacktop], sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:1107:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &gs->goalstack[gs->goalstacktop - 1], sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_move.c:534:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_move.c:547:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.c:203:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.c:252:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &wc->weaponinfo[weaponinfo.number], &weaponinfo, sizeof( weaponinfo_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.c:299:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &wc->weaponinfo[i].proj, &wc->projectileinfo[j], sizeof( projectileinfo_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.c:398:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( weaponinfo, &weaponconfig->weaponinfo[weapon], sizeof( weaponinfo_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.h:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.h:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.h:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.h:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weap.h:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char projectile[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:582:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( filename, "wb" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.h:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ea.c:401:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( input, bi, sizeof( bot_input_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ea.c:426:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bi, init, sizeof( bot_input_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/botai.h:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/botlib.h:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_LOGFILENAMESIZE]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.c:78:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.fp = fopen(ospath, "wb"); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:289:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( t, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:345:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, source->tokens, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:678:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. define->name = (char *) GetMemory(strlen(builtin[i].string) + 1); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:708:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token->string, "%d", deftoken->line ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:959:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2434:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%ld", labs( value ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2460:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%1.2f", fabs( value ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2540:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%ld", labs( value ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2570:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%1.2f", fabs( value ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2756:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &source->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2788:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2798:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "string" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2801:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "literal" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2804:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "number" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2807:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "name" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2810:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "punctuation" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2819:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "decimal" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2822:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "hex" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2825:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "octal" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2828:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "binary" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2831:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " long" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2834:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " unsigned" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2837:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " float" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2840:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " integer" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2905:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, &tok, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; //file name of the script data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.h:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char includepath[MAX_QPATH]; //path to include files data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:165:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char basefolder[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:844:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &script->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:858:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, &script->token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:920:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &script->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:951:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:961:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "string" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:964:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "literal" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:967:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "number" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:970:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "name" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:973:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "punctuation" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:982:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "decimal" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:985:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "hex" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:988:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "octal" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:991:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "binary" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:994:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " long" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:997:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " unsigned" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1000:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " float" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1003:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " integer" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1073:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, &tok, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &script->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1330:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1349:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( filename, "rb" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.h:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKEN]; //available token data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.h:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; //file name of the script data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_struct.c:228:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( (char *)p )[MAX_STRINGFIELD - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_struct.c:363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test[4]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:52:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trap_SendClientCommand( va( "gc %i %i", targetNum, atoi( test ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:216:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:217:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:347:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:380:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:384:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:397:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamStr[80], classStr[80], weapStr[80]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:408:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatCmd[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:429:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatCmd[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:450:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char crosshair[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:453:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.newCrosshairIndex = atoi( crosshair ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:465:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char locfilename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:466:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char locname[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systemChat[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:46:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChat1[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:47:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChat2[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:165:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16], *ptr; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16], *ptr; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:658:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:661:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classType[2] = { 0, 0 }; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:993:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pickupText[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:1048:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:1469:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:1891:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rendererinfos[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2381:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str1[32], str2[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2503:62: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cg.snap->ps.persistant[PERS_TEAM] == TEAM_SPECTATOR && atoi( buf ) == 0 && latch == 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2534:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2550:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2565:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2657:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char deploytime[128]; // JPW NERVE data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2777:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). defender = atoi( Info_ValueForKey( cs, "defender" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3194:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3244:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3282:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamstr[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3331:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( teamstr, "axis_desc" ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3333:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( teamstr, "allied_desc" ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3339:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( buf && atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3340:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( buf ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3375:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi( Info_ValueForKey( s, "status" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_drawtools.c:1408:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char staticbuf[2][MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:613:63: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int CG_GetOriginForTag( centity_t *cent, refEntity_t *parent, char *tagName, int startIndex, vec3_t org, vec3_t axis[3] ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_effects.c:1267:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:439:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:1305:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:1609:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:1820:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:2145:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) == s1->number ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:2150:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pi = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:49:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetName[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char attackerName[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:252:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( attackerName, "noname" ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_flamethrower.c:1177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[512]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_flamethrower.c:1206:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char personality[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:194:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). vars[v++] = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:234:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hunkBuf[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_info.c:249:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). expectedHunk = atoi( hunkBuf ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_QPATH]; // md3_lower, md3_lbelt, md3_rbelt, etc. data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; // lower.md3, belt1.md3, etc. data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dl_stylestring[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:560:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:561:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:562:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hSkinName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:598:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headModelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:800:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoScreenText[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:812:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char killerName[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:813:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spectatorList[MAX_STRING_CHARS]; // list of names data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char centerPrint[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:932:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testModelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:955:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oidPrint[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:977:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spawnVars[MAX_SPAWN_VARS][2]; // key / value pairs data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:979:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnVarChars[MAX_SPAWN_VARS_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:982:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char twoMinuteSound_g[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:983:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char twoMinuteSound_a[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:984:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thirtySecondSound_g[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:985:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char thirtySecondSound_a[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1516:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char redTeam[MAX_QPATH]; // A team data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1517:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blueTeam[MAX_QPATH]; // B team data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1523:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteString[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1529:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamVoteString[2][MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1548:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChatMsgs[TEAMCHAT_HEIGHT][TEAMCHAT_WIDTH * 3 + 1]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char notifyMsgs[NOTIFY_HEIGHT][NOTIFY_WIDTH * 3 + 1]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1884:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char systemChat[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1885:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char teamChat1[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:1886:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char teamChat2[256]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_local.h:2130:65: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int CG_GetOriginForTag( centity_t * cent, refEntity_t * parent, char *tagName, int startIndex, vec3_t org, vec3_t axis[3] ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_localents.c:578:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &( nle->leType ), &( le->leType ), sizeof( localEntity_t ) - 2 * sizeof( localEntity_t * ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:500:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:511:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.localServer = atoi( var ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:586:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:592:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:611:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:622:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:648:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:674:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). entnum = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:681:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cent->dl_frame = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:688:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cent->dl_sound = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:691:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cent->dl_atten = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:751:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data, start, len ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:773:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char items[MAX_ITEMS + 1]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:774:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1040:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1043:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char items[MAX_ITEMS + 1]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1044:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *sb_nums[11] = { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1434:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1446:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1555:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parm1[MAX_QPATH], parm2[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1571:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUFILE]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1826:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUDEFFILE]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:2051:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:2111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:2296:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_marks.c:261:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mark->verts, verts, mf->numPoints * sizeof( verts[0] ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:197:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:796:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:815:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:949:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:1148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:1160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:1298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:1394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:102:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *shaderAnimNames[MAX_SHADER_ANIMS] = { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:1527:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:1561:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numparticles = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:1564:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). turb = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_particles.c:1567:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). snum = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[100000]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cg_customSoundNames[MAX_CUSTOM_SOUNDS] = { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tags[2] = {"tag_footleft", "tag_footright"}; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:265:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:387:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namefromskin[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:388:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:443:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelsUsed[MAX_ANIMSCRIPT_MODELS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:499:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namefromskin[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:500:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:551:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scaleString[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:632:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namefromskin[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:675:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( v ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:706:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:969:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.botSkill = atoi( v ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:973:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.handicap = atoi( v ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:977:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.wins = atoi( v ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:981:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.losses = atoi( v ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:985:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.team = atoi( v ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:992:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:1010:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:2483:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:2774:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( legs.torsoAxis, torso.axis, sizeof( torso.axis ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:3049:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( or->axis, tempAxis, sizeof( vec3_t ) * 3 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_players.c:3102:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( or->axis, tempAxis, sizeof( vec3_t ) * 3 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamstr[32]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:241:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( buf ) == -1 ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:242:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). } else if ( atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:332:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( teamstr, "short_axis_desc" ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:334:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( teamstr, "short_allied_desc" ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:340:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( buf && atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:341:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( buf ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:358:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi( Info_ValueForKey( s, "status" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:502:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). defender = atoi( Info_ValueForKey( s, "defender" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:505:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). winner = atoi( Info_ValueForKey( s, "winner" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:49:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numScores = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:54:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.teamScores[0] = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:55:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.teamScores[1] = atoi( CG_Argv( 3 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:60:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].client = atoi( CG_Argv( i * 8 + 4 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:61:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].score = atoi( CG_Argv( i * 8 + 5 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:62:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].ping = atoi( CG_Argv( i * 8 + 6 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:63:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].time = atoi( CG_Argv( i * 8 + 7 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:64:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].scoreFlags = atoi( CG_Argv( i * 8 + 8 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:65:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). powerups = atoi( CG_Argv( i * 8 + 9 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:66:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].playerClass = atoi( CG_Argv( i * 8 + 10 ) ); // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:67:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].respawnsLeft = atoi( CG_Argv( i * 8 + 11 ) ); // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:105:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.identifyClientNum = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:106:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.identifyClientHealth = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:109:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numSortedTeamPlayers = atoi( CG_Argv( 3 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:118:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client = atoi( CG_Argv( i * 5 + 4 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:127:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].location = atoi( CG_Argv( i * 5 + 5 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:128:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].health = atoi( CG_Argv( i * 5 + 6 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:129:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].powerups = atoi( CG_Argv( i * 5 + 7 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:131:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg_entities[ client ].currentState.teamNum = atoi( CG_Argv( i * 5 + 8 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:149:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.gametype = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:150:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.antilag = atoi( Info_ValueForKey( info, "g_antilag" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:160:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.maxclients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:171:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg_redlimbotime.integer = atoi( Info_ValueForKey( info, "g_redlimbotime" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:172:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg_bluelimbotime.integer = atoi( Info_ValueForKey( info, "g_bluelimbotime" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:175:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.minclients = atoi( Info_ValueForKey( info, "g_minGameClients" ) ); // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:193:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.currentRound = atoi( Info_ValueForKey( info, "g_currentRound" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:195:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.gamestate = atoi( Info_ValueForKey( info, "gamestate" ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:212:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). warmup = atoi( info ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:237:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.fadeStartTime = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:239:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.fadeDuration = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:270:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). token = COM_Parse( (char **)&info ); time = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:292:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( CG_ConfigString( CS_SCORES1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:293:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( CG_ConfigString( CS_SCORES2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:294:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( CG_ConfigString( CS_LEVEL_START_TIME ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:305:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.warmup = atoi( CG_ConfigString( CS_WARMUP ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char originalShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeOffset[16]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:358:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:377:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:379:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:381:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:383:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteTime = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:386:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteYes = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:389:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteNo = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:396:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteTime[num - CS_TEAMVOTE_TIME] = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:399:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteYes[num - CS_TEAMVOTE_YES] = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:402:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteNo[num - CS_TEAMVOTE_NO] = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:409:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.intermissionStarted = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:530:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:609:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[10000]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:798:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:801:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chats[MAX_VOICESOUNDS][MAX_CHATSIZE]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:807:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:815:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headmodel[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_VOICEFILESIZE]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:962:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_VOICEFILESIZE]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1029:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128], *headModelName; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_SAY_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_SAY_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1213:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &voiceChatBuffer[0],vchat,sizeof( bufferedVoiceChat_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1301:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). voiceOnly = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1302:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clientNum = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1303:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). color = atoi( CG_Argv( 3 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1306:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). origin[0] = atoi( CG_Argv( 5 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1307:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). origin[1] = atoi( CG_Argv( 6 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1308:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). origin[2] = atoi( CG_Argv( 7 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1354:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SAY_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1454:90: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). CG_PriorityCenterPrint( s, SCREEN_HEIGHT - ( SCREEN_HEIGHT * 0.25 ), SMALLCHAR_WIDTH, atoi( CG_Argv( 2 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1494:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( CG_Argv( 2 ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1517:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( CG_Argv( 2 ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1573:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.complaintClient = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1602:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader1[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1603:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader2[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1604:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader3[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_snapshot.c:152:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->currentState, state, sizeof( entityState_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_snapshot.c:173:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char prevmap[64] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_snapshot.c:174:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curmap[64]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_snapshot.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->nextState, es, sizeof( entityState_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c:372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char soundFiles[MAX_SOUND_FILES][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_sound.c:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_spawn.c:71:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *out = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_spawn.c:148:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, string, l + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_spawn.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_spawn.c:167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_trails.c:701:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. mid.modulate[l] = ( unsigned char )( mod[l] / 4.0 ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c:389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c:1377:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) ) { // this camera has fog data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c:1401:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fogStart = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c:1408:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fogEnd = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:926:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:988:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:994:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:1012:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].loopFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:1029:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:1035:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:1043:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].moveSpeed |= ( ( atoi( token ) ) << 8 ); // use 2nd byte for draw bits data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:1068:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH], comppath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4029:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bank = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_weapons.c:4091:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_avi.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:230:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). index = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:269:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cl.gameState.stringData + cl.gameState.dataCount, dup, len + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:291:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bigConfigString[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:927:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outstr[256]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:952:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) == memusage ) { // if it is the same, abort this process data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:342:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 32); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:361:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 16); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:380:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 32); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:413:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 8); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:414:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst+spl, src+8, 8); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cin.c:1452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:353:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tbuf, con.text, CON_TEXTSIZE * sizeof( short ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:663:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:669:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_input.c:79:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k = atoi( c ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_input.c:103:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). b->downtime = atoi( c ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_input.c:116:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k = atoi( c ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_input.c:139:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uptime = atoi( c ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1334:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str, edit->buffer + prestep, drawLen ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1578:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_EDIT_LINE-1]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1827:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tinystr[5]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1984:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[1024]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ MAX_STRING_CHARS ], *p = buf, *end; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2185:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[1024]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2495:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char consoleSaveBuffer[ MAX_CONSOLE_SAVE_BUFFER ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2529:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). historyEditLines[ i ].cursor = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2534:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). historyEditLines[ i ].scroll = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2539:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numChars = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:161:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_reconnectArgs[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:162:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_oldGame[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:189:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autoupdateFilename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:258:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int id = atoi(idstr); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:275:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int id = atoi(idstr); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:312:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int id = atoi(Cmd_Argv(2)); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:582:32: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (encio == NULL) encio = fopen("voip-outgoing-encoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:585:32: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (decio == NULL) decio = fopen("voip-outgoing-decoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:727:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char demoName[MAX_QPATH]; // compiler bug workaround data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:729:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:900:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ MAX_STRING_CHARS ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1083:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoExt[ 16 ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1099:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char retry[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1124:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). protocol = atoi(ext_test + ARRAY_LEN(DEMOEXT)); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1209:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1688:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nums[64]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char server[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1932:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_RCON_MESSAGE]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1980:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cMsg[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2407:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char missingfiles[1024]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2463:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2464:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_INFO_STRING + 10]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2780:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi(c); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2785:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ver = atoi(strver); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2838:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clc.challenge = atoi(Cmd_Argv(1)); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2840:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clc.onlyVisibleClients = atoi( Cmd_Argv( 2 ) ); // DHM - Nerve data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2877:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi(c); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3178:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3179:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverName[ MAX_OSPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char groupStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3354:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cacheIndex = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3364:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3409:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3555:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dllName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3670:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char binName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3692:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[ MAX_OSPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3790:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[ QKEY_SIZE ]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4208:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->clients = atoi( Info_ValueForKey( info, "clients" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4211:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->maxClients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4213:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->gameType = atoi( Info_ValueForKey( info, "gametype" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4214:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->netType = atoi( Info_ValueForKey( info, "nettype" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4215:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->minPing = atoi( Info_ValueForKey( info, "minping" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4216:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->maxPing = atoi( Info_ValueForKey( info, "maxping" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4217:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->allowAnonymous = atoi( Info_ValueForKey( info, "sv_allowAnonymous" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4218:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->friendlyFire = atoi( Info_ValueForKey( info, "friendlyFire" ) ); // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4219:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->maxlives = atoi( Info_ValueForKey( info, "maxlives" ) ); // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4220:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->tourney = atoi( Info_ValueForKey( info, "tourney" ) ); // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4221:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->punkbuster = atoi( Info_ValueForKey( info, "punkbuster" ) ); // DHM - Nerve data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4223:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->antilag = atoi( Info_ValueForKey( info, "g_antilag" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4224:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->g_humanplayers = atoi( Info_ValueForKey( info, "g_humanplayers" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4225:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->g_needpass = atoi( Info_ValueForKey( info, "g_needpass" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4287:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). prot = atoi( Info_ValueForKey( infoString, "protocol" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4619:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[1024], *masteraddress; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4621:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((count = Cmd_Argc()) < 3 || (masterNum = atoi(Cmd_Argv(1))) < 0 || masterNum > MAX_MASTER_SERVERS) data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4632:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(command, "sv_master%d", i); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4650:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(command, "sv_master%d", masterNum); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4893:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &pingptr->adr, &to, sizeof( netadr_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4909:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4964:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &cl_pinglist[j].adr, &server[i].adr, sizeof( netadr_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5096:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chs[3]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char original[MAX_TRANS_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char translated[MAX_LANGUAGES][MAX_TRANS_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5229:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static trans_t* AllocTrans( char *original, char *translated[MAX_LANGUAGES] ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5229:45: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static trans_t* AllocTrans( char *original, char *translated[MAX_LANGUAGES] ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5274:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static trans_t* LookupTrans( char *original, char *translated[MAX_LANGUAGES], qboolean isLoading ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5274:46: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static trans_t* LookupTrans( char *original, char *translated[MAX_LANGUAGES], qboolean isLoading ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5422:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char format_org[128], format_trans[128]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char translated[MAX_LANGUAGES][MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5476:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char original[MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5655:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5682:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5711:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( buf, "(null)" ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5801:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:33:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *svc_strings[256] = { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:478:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:479:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:483:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cl.serverId = atoi( Info_ValueForKey( systemInfo, "sv_serverid" ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:505:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cl_connectedToCheatServer = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:581:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clc.sv_allowDownload = atoi(Info_ValueForKey(serverInfo, data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:600:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldGame[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:637:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cl.gameState.stringData + cl.gameState.dataCount, s, len + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:698:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[MAX_MSGLEN]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:839:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char encoded[4000]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:933:29: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (encio == NULL) encio = fopen("voip-incoming-encoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:936:29: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (decio == NULL) decio = fopen("voip-incoming-decoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[16]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:361:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[256]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:398:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[11]; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_ui.c:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; // extracted from CS_SERVERINFO data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char limboChatMsgs[LIMBOCHAT_HEIGHT][LIMBOCHAT_WIDTH * 3 + 1]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char translationVersion[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servername[MAX_OSPATH]; // name of server from original connect (used by reconnect) data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverMessage[MAX_STRING_TOKENS]; // for display on connection dialog data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reliableCommands[MAX_RELIABLE_COMMANDS][MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverCommands[MAX_RELIABLE_COMMANDS][MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadTempName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:235:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadURL[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sv_dlURL[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadList[MAX_INFO_STRING]; // list of paks we need to download data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:266:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char timeDemoDurations[ MAX_TIMEDEMO_DURATIONS ]; // log of frame durations data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapName[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char game[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gameName[MAX_NAME_LENGTH]; // Arnout data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateChallenge[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:383:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateInfoString[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:390:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char autoupdateServerNames[MAX_AUTOUPDATE_SERVERS][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/client.h:403:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cl_oldGame[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:56:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t name[256]; data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:61:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t identity[256]; data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:63:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char context[256]; data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:64:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t description[2048]; data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[256]; data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lm->context, context, len); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.c:62:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rtn = codec->open(localName); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.c:99:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rtn = codec->open(altName); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.h:63:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). CODEC_OPEN open; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec_wav.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[5]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec_wav.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dump[16]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:41:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s_backgroundLoop[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[4][16]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem[2][16]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:187:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[0], "16bit"); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:188:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[1], "adpcm"); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:189:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[2], "daub4"); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:190:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[3], "mulaw"); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:191:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem[0], "paged out"); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:192:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem[1], "resident "); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:1275:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. rawsamples[dst].left = ((char *)data)[src*2] * intVolumeLeft; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:1276:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. rawsamples[dst].right = ((char *)data)[src*2+1] * intVolumeRight; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_local.h:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char soundName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_local.h:216:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loop[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:2001:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s_backgroundLoop[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:2658:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devicenames[16384] = ""; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:2777:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inputdevicenames[16384] = ""; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:232:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:417:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( client->ps.weapons, weaponInfo->startingWeapons, sizeof( weaponInfo->startingWeapons ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:699:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loading[4]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:717:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( strlen( loading ) > 0 && atoi( loading ) != 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:718:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !reloading && atoi( loading ) == 2 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_debug.c:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *aifuncs[MAX_AIFUNCS]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_debug.c:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_fight.c:260:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( enemies, sortedEnemies, sizeof( int ) * enemyCount ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:246:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int1 = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:248:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int2 = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:250:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eInt = atoi( event->params ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:534:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cs->castScriptEvents, cast_temp_events, sizeof( cast_script_event_t ) * numEventItems ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:456:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). duration = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:653:57: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->castScriptStatus.scriptNoAttackTime = level.time + atoi( params ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:699:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, tokens[3][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:759:62: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). endtime = cs->castScriptStatus.castScriptStackChangeTime + atoi( tokens[1] ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:884:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). Add_Ammo( &g_entities[cs->entityNum], weapon, atoi( token ), qtrue ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:940:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int spillover = atoi( token ) - ammoTable[weapon].maxclip; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:948:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].client->ps.ammoclip[weapon] = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1417:62: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return ( ( cs->castScriptStatus.castScriptStackChangeTime + atoi( token ) ) < level.time ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1465:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, lastToken[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1475:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bufferIndex = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1492:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] += atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1497:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] < atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1505:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] > atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1513:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] != atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1521:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] == atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1529:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] |= ( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1534:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] &= ~( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1539:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1547:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !( cs->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1555:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1560:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] = rand() % atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1670:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). player->missionLevel = atoi( params ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:1885:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pch, *newstr, cmd[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:2007:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->castScriptStatus.scriptNoSightTime = level.time + atoi( params ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:2352:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].health = atoi( params ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:2353:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].client->ps.stats[STAT_HEALTH] = atoi( params ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script_actions.c:2389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_think.c:1094:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( move->touchents, pm.touchents, sizeof( pm.touchents ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_think.c:1146:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ucmd, &cs->bs->lastucmd, sizeof( usercmd_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:79:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:106:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:135:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:154:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:166:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:187:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:199:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:219:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:221:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:236:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:267:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mapname[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:455:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:494:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:579:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( name, "[world]" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:660:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:766:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:821:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:886:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:939:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:1030:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:177:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &cp->goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestring[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyarea[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addressedto[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botname[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE], netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:474:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:589:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:629:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:665:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:865:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:993:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1046:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1077:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char goalname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1245:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &tmpgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1324:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE], teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enemy[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1432:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flag[128], netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:65:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeswitch[MAX_NODESWITCHES + 1][144]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:291:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:463:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:490:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:540:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:570:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:637:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( buf, " to " ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:677:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->curpatrolpoint->goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:761:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:818:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->lead_teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:1263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skin[128], *p; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:208:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->teamgoal, &ctf_redflag, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:209:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. } else { memcpy( &bs->teamgoal, &ctf_blueflag, sizeof( bot_goal_t ) );} data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:348:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128] = {0}; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:561:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:931:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->teamgoal, goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:996:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bestgoal, &goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1938:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1939:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_INFO_STRING], tmpmodel[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[128], classname[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetname[10][128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2235:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[128], model[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2248:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2315:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelindex = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2531:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botname[MAX_NETNAME], message[MAX_MESSAGE_SIZE], netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2629:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2771:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gender[144], name[144]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2772:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2863:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2892:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:155:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( state, &ent->client->ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:178:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( state, &ent->s, sizeof( entityState_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:210:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vars[MAX_MATCHVARIABLES]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:532:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], *args; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:627:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[144], name[144], gender[144]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:657:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->settings, settings, sizeof( bot_settings_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:781:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &settings, &bs->settings, sizeof( bot_settings_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:782:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ps, &bs->cur_ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:802:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->cur_ps, &ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:803:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->settings, &settings, sizeof( bot_settings_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1050:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1131:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( buf, "20" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.h:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.h:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamleader[MAX_NETNAME]; //netname of the team leader data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.h:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subteam[32]; //sub team name data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:89:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:145:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamchat[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:207:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:439:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:65:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char defineStrings[10000]; // stores the actual strings data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:583:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animModelInfo->version = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:635:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:654:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:661:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:681:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:688:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].animBlend = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:738:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skip = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:741:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:749:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:776:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void BG_ParseConditionBits( char **text_pp, animStringItem_t *stringTable, int condIndex, int result[RESULT_SIZE] ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:780:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char currentString[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1009:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). command->animDuration[partIndex] = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1182:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &defineStr[ANIM_COND_ENEMY_WEAPON][0], &defineStr[ANIM_COND_WEAPON][0], sizeof( animStringItem_t ) * MAX_ANIM_DEFINES ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:321:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:321:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:327:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:327:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:343:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[count] = c; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:348:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy( void *dest, const void *src, size_t count ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:350:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[count] = ((char *)src)[count]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:350:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[count] = ((char *)src)[count]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:1164:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi( const char *string ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:1823:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char convert[24]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:1940:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconvert[20]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:1941:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fconvert[20]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:101:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi( const char *string ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:112:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy( void *dest, const void *src, size_t count ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_misc.c:3863:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_public.h:1034:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_public.h:1218:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *world_model[MAX_ITEM_MODELS]; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_public.h:1595:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelname[MAX_QPATH]; // name of the model data/iortcw-1.51.c+dfsg1/MP/code/game/g_antilag.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_antilag.c:180:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). period = atoi(buffer); data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char g_botInfos[MAX_BOTS][MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char g_arenaInfos[MAX_ARENAS][MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ARENAS_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:416:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:477:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:482:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). settings.skill = atoi( Info_ValueForKey( userinfo, "skill" ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:513:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:648:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:649:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:650:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:669:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skill = Com_Clamp( 1, 5, atoi( string ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:680:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi( string ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:705:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bots[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_bot.c:762:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BOTS_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelsUsed[MAX_ANIMSCRIPT_MODELS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1234:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[100000]; // <- was causing callstacks >64k data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH], modelname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldname[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1330:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( userinfo, "\\name\\badinfo" ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1337:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1345:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1353:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1380:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->pers.maxHealth = atoi( Info_ValueForKey( userinfo, "handicap" ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1518:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:1736:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_client.c:2202:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). anim->moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:37:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1000]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:142:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char line[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:154:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( line + len, arg, tlen ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanName[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:207:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:257:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). amount = atoi( amt ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:716:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.latchPlayerType = atoi( ptype ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:717:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.latchPlayerWeapon = atoi( weap ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:718:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.latchPlayerItem = atoi( grenade ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:719:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.latchPlayerSkin = atoi( skinnum ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:770:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:771:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptype[4], weap[4], pistol[4], grenade[4], skinnum[4]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:821:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1002:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1004:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SAY_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1005:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[64]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1267:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). targetNum = atoi( arg ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1383:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1391:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). order = atoi( arg ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1448:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg1[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1449:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg2[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1537:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( arg2 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1557:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1567:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1600:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanName[64]; // JPW NERVE data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1655:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1774:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1844:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2387:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). entnum = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2390:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). enemynum = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2393:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2478:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clent->client->sess.spawnObjectiveIndex = atoi( arg ); // JPW NERVE data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:2490:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_items.c:1214:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_ITEMS + 1]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:486:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:671:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:672:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteDisplayString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:681:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamVoteString[2][MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:690:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spawnVars[MAX_SPAWN_VARS][2]; // key / value pairs data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:692:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnVarChars[MAX_SPAWN_VARS_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:1055:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char characterfile[MAX_FILEPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_local.h:1242:62: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void trap_AdjustAreaPortalState( gentity_t *ent, qboolean open ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:378:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:404:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:962:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1098:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1158:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1718:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; // DHM - Nerve data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1740:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). winner = atoi( buf ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1829:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nextmap[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1830:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d1[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1893:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1976:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1980:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). defender = atoi( Info_ValueForKey( cs, "defender" ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1983:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). winner = atoi( Info_ValueForKey( cs, "winner" ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:2113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:2121:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). a = atoi( buf ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:2151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:2152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char txt[5]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:2495:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str2[20]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_mem.c:41:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[POOLSIZE]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:1030:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:2075:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:2549:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_missile.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[64]; //DAJ data/iortcw-1.51.c+dfsg1/MP/code/game/g_mover.c:4230:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_mover.c:4269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:3275:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->s.frame = atoi( startonframe ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_props.c:3287:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->props_frame_state = atoi( loop ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:176:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int1 = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:178:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int2 = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:180:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eInt = atoi( event->params ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:456:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ent->scriptEvents, g_temp_events, sizeof( g_script_event_t ) * numEventItems ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:471:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &scriptStatusBackup, &ent->scriptStatus, sizeof( g_script_status_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:482:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ent->scriptStatus, &scriptStatusBackup, sizeof( g_script_status_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:263:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). duration = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, name[MAX_QPATH], trigger[MAX_QPATH], *token; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sound[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, tokens[2][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:384:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). startframe = atoi( tokens[0] ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:385:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). endframe = atoi( tokens[1] ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:410:57: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). endtime = ent->scriptStatus.scriptStackChangeTime + atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:421:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rate = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:516:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, lastToken[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:526:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bufferIndex = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:543:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] += atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:548:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] < atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:556:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] > atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:564:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] != atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:572:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] == atoi( token ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:580:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] |= ( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:585:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] &= ~( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:590:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:598:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !( ent->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:606:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:611:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] = rand() % atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:659:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). player->missionLevel = atoi( params ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:715:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). angles[i] = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:725:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). duration = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:965:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:989:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1068:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1078:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1114:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1160:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1204:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1250:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1284:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1294:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1330:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1343:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1385:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1395:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1428:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:1441:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_session.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_session.c:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_session.c:225:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gt = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:71:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *out = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:802:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *( int * )( b + f->ofs ) = atoi( value ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:897:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, string, l + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:915:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:916:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:997:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[ENTITYNUM_WORLD].spawnflags = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char compare[33]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:130:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). b[i] = atoi( num ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iplist_final[MAX_CVAR_VALUE_STRING] = {0}; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:155:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[64] = {0}; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:322:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:473:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:512:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:618:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_syscalls.c:178:59: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void trap_AdjustAreaPortalState( gentity_t *ent, qboolean open ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_syscalls.c:179:44: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). syscall( G_ADJUST_AREA_PORTAL_STATE, ent, open ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:1111:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->start_size = atoi( rampup ) * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/g_target.c:1117:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->end_size = atoi( rampdown ) * 1000; data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:809:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; // NERVE - SMF data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:819:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). defendingTeam = atoi( def ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:960:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:961:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1400]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:1168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numspawntargets[128]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:1170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_tramcar.c:694:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:942:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:69:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buff[MAX_STRING_CHARS * 4]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[( MAX_QPATH * 2 ) + 5]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:337:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][32]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_utils.c:350:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][64]; data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:324:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ammo,traceEnt->client->ps.ammo,sizeof( int ) * MAX_WEAPONS ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:325:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ammoclip,traceEnt->client->ps.ammoclip,sizeof( int ) * MAX_WEAPONS ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:326:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( weapons,traceEnt->client->ps.weapons,sizeof( int ) * ( MAX_WEAPONS / ( sizeof( int ) * 8 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:330:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( traceEnt->client->ps.ammo,ammo,sizeof( int ) * MAX_WEAPONS ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:331:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( traceEnt->client->ps.ammoclip,ammoclip,sizeof( int ) * MAX_WEAPONS ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_weapon.c:332:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( traceEnt->client->ps.weapons,weapons,sizeof( int ) * ( MAX_WEAPONS / ( sizeof( int ) * 8 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/null/null_glimp.c:57:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) { data/iortcw-1.51.c+dfsg1/MP/code/null/null_glimp.c:57:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) { data/iortcw-1.51.c+dfsg1/MP/code/null/null_glimp.c:57:82: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) { data/iortcw-1.51.c+dfsg1/MP/code/null/null_main.c:59:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen( ospath, mode ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_load.c:113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cm.shaders, in, count * sizeof( *cm.shaders ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_load.c:463:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cm.entityString, cmod_base + l->fileofs, l->filelen ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_load.c:489:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cm.visibility, buf + VIS_HEADER, len - VIS_HEADER ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_local.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_patch.c:1182:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pf->facets, facets, numFacets * sizeof( *pf->facets ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_patch.c:1184:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pf->planes, planes, numPlanes * sizeof( *pf->planes ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_polylib.c:118:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( w->p, p, nump * sizeof( p[0] ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_polylib.c:671:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( hullPoints, ( *hull )->p, numHullPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_polylib.c:730:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( hullPoints, newHullPoints, numHullPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_polylib.c:737:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( w->p, hullPoints, numHullPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_public.h:69:70: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void CM_AdjustAreaPortalState( int area1, int area2, qboolean open ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_test.c:398:66: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void CM_AdjustAreaPortalState( int area1, int area2, qboolean open ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cm_test.c:407:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( open ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:61:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cmd_wait = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:105:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &cmd_text.data[cmd_text.cursize], text, l ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:134:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cmd_text.data, text, len - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_CMD_LINE]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:233:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( line, text, i ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:352:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *cmd_argv[MAX_STRING_TOKENS]; // points into cmd_tokenized data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:353:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_tokenized[BIG_INFO_STRING + MAX_STRING_TOKENS]; // will have 0 bytes inserted data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:354:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_cmd[BIG_INFO_STRING]; // the original command we received (no token processing) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:400:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_args[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:422:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_args[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:54:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *com_argv[MAX_NUM_ARGVS + 1]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:139:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_errorMessage[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:259:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:429:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *com_consoleLines[MAX_CONSOLE_LINES]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:628:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_filter[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dump[32], *ptr; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1524:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2483:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_cdkey[34] = " "; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2485:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_cdkey[34] = "123456789"; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2496:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[33]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2497:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuffer[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2526:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[33]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2527:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuffer[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuffer[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2558:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[17]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2950:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3054:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3399:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char shortestMatch[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3454:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[ TRUNCATE_LENGTH ]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:218:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[ MAX_CVAR_VALUE_STRING ]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:320:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char clean[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:480:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). var->integer = atoi( var->string ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:660:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). var->integer = atoi( var->string ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:711:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[32]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:728:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[32]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:958:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:1273:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:1294:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:235:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakPathname[MAX_OSPATH]; // c:\quake3\baseq3 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakFilename[MAX_OSPATH]; // c:\quake3\baseq3\pak0.pk3 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakBasename[MAX_OSPATH]; // pak0 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:238:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakGamename[MAX_OSPATH]; // baseq3 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_OSPATH]; // c:\quake3 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[MAX_OSPATH]; // c:\quake3\baseq3 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gamedir[MAX_OSPATH]; // baseq3 data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:263:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fs_gamedir[MAX_OSPATH]; // this will be a single file name with no separators data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:305:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:318:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *fs_serverPakNames[MAX_SEARCH_PATHS]; // pk3 names data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:324:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *fs_serverReferencedPakNames[MAX_SEARCH_PATHS]; // pk3 names data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:327:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidBase[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:328:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidComBaseGame[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:329:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidFsBaseGame[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:330:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidGame[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:525:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:526:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ospath[2][MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:552:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1127:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). protocol = atoi(ext_test + ARRAY_LEN(DEMOEXT)); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1170:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1538:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dllName[MAX_OSPATH], qvmName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1897:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2291:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename_inzip[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2469:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int FS_AddFileToList( char *name, char *list[MAX_FOUND_FILES], int nfiles ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2469:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int FS_AddFileToList( char *name, char *list[MAX_FOUND_FILES], int nfiles ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2497:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list[MAX_FOUND_FILES]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2505:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zpath[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2756:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descPath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2793:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3205:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAX_OSPATH + 1], *pakfile; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sorted[MAX_PAKFILES]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3240:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sorted[i],"zz",2 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3253:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sorted[i],"mp",2 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3439:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3807:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorText[MAX_STRING_CHARS] = ""; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3808:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char missingPaks[MAX_STRING_CHARS] = ""; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3951:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorText[MAX_STRING_CHARS] = ""; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3983:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4009:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4039:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4065:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4091:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4127:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4208:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fs_serverPaks[i] = atoi( Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4264:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fs_serverReferencedPaks[i] = atoi( Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4507:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[ MAX_STRING_CHARS ]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teststring[ BIG_INFO_STRING ]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/json.h:300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cValue[256]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/json.h:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cValue[256]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/json.h:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cValue[256]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:25:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:189:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, len); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:192:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, t); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:201:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, 64); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:210:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, len); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:257:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(digest, ctx->buf, 16); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:264:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char final[33] = {""}; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/md5.c:265:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16] = {""}; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:324:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:350:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:453:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:483:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:513:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:68:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *netsrcString[2] = { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:371:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( chan->fragmentBuffer + chan->fragmentLength, data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:393:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( msg->data + 4, chan->fragmentBuffer, chan->fragmentLength ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:461:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( net_message->data, loop->msgs[i].data, loop->msgs[i].datalen ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:479:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( loop->msgs[i].data, data, length ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:580:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MSGLEN]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:638:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base[MAX_STRING_CHARS], *search; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:689:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). a->port = BigShort((short) atoi(port)); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IF_NAMESIZE]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:319:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sadr, search->ai_addr, search->ai_addrlen); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:458:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:478:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:636:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char socksBuf[4096]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:672:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &socksBuf[10], data, length ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrbuf[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1072:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[64]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1160:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &buf[2], net_socksUsername->string, ulen ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1164:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &buf[3 + ulen], net_socksPassword->string, plen ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1264:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&localIP[numIP].addr, addr, addrlen); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1265:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&localIP[numIP].netmask, netmask, addrlen); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[256]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/pbmd5.c:61:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; /* input buffer */ data/iortcw-1.51.c+dfsg1/MP/code/qcommon/pbmd5.c:62:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16]; /* actual digest after MD5Final call */ data/iortcw-1.51.c+dfsg1/MP/code/qcommon/pbmd5.c:107:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char PADDING[64] = { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/pbmd5.c:345:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ret[33]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:345:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:346:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_parsename[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:388:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:399:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1120:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char temp_buffer[MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1121:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_VA_STRING]; // in case va is called by nested functions data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1140:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, temp_buffer, len + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1214:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value[2][BIG_INFO_VALUE]; // use two buffers so compares data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[MAX_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:395:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Com_Memcpy memcpy data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:848:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:1058:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:1238:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringData[MAX_GAMESTATE_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:1673:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[32]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.h:1679:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:848:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qcommon.h:869:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cl_cdkey[34]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:169:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:234:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:363:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Comp[24]; // MC_COMP_BYTES is in MatComp.h, but don't want to couple data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:381:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:388:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:446:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:447:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // name of tag data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:509:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // name of bone data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:520:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:639:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/qfiles.h:684:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:97:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char symbols[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:547:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:591:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:1026:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("syscalls.log", "w" ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:108:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char vm_opInfo[256] = data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:179:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *opnames[256] = { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:257:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("code.bin", O_TRUNC|O_WRONLY|O_CREAT, 0644); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:263:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vm->codeBase+vm->codeLength, &isn, 4); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:668:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[4]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:677:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arg.b, &code[pc], 4); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_armv7l.c:1184:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( argPointer, args, 4 * MAX_VMMAIN_ARGS ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_interpreted.c:26:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *opnames[256] = { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_interpreted.c:139:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&word, addr, 4); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_local.h:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char symName[1]; // variable sized data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_local.h:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc.c:196:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char vm_opInfo[256] = data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc.c:486:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &(di_now->code[0]), is, iBytes ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc.c:1839:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( codeNow, &(di_now->code[0]), di_now->length * sizeof( ppc_instruction_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc.c:2034:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[4]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc.c:2104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( argPointer, args, 4 * MAX_VMMAIN_ARGS ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_powerpc_asm.c:64:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char operands[8]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:60:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char args[4]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:412:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char vm_opInfo[256] = data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:482:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *opnames[256] = { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:696:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dp->code[0], fp->insn_buf, insns_size); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:837:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(currentVM->dataBase+dest, currentVM->dataBase+src, count); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:1466:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(code_now, &dp->code[0], dp->length * sizeof(unsigned int)); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:1603:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[4]; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm_sparc.c:1655:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( argPointer, args, 4 * MAX_VMMAIN_ARGS ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_animation.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char validBones[MDS_MAX_BONES]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_animation.c:60:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newBones[ MDS_MAX_BONES ]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_animation.c:1015:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bonePtr->matrix, tmpAxis, sizeof( tmpAxis ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_animation.c:1027:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( oldBones, bones, sizeof( bones[0] ) * header->numBones ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_backend.c:1970:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:173:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ColorToRGBM(const vec3_t color, unsigned char rgbm[4]) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:289:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:327:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:387:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(color, &buf_p[j*12], 12); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:593:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, buf + 8, len - 8 ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:1961:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2214:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out, in, count * sizeof( *out ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2548:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( w->lightGridData, ( void * )( fileBase + l->fileofs ), l->filelen ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2559:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2626:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2627:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2730:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_ParseSpawnVars( char *spawnVarChars, int maxSpawnVarChars, int *numSpawnVars, char *spawnVars[MAX_SPAWN_VARS][2] ) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2730:90: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_ParseSpawnVars( char *spawnVarChars, int maxSpawnVarChars, int *numSpawnVars, char *spawnVars[MAX_SPAWN_VARS][2] ) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2732:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2733:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2803:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2850:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cubemapJson, *keyValueJson, *indexes[3]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2875:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnVarChars[2048]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2877:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spawnVars[MAX_SPAWN_VARS][2]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2904:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2982:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:3228:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:3243:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fileName, "primarylg%d.tga", i); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_curve.c:386:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_curve.c:389:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_curve.c:399:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_curve.c:402:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_extensions.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[256]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_fbo.h:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_font.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:170:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgPart[1024]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:491:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uniformName[1000]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:590:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpCode[32000]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:591:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fpCode[32000]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:926:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extradefines[1024]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:41:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char s_gammatable[256]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:2371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:2388:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ddsName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:2510:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char normalName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3033:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char surfName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3377:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( skin->surfaces, parseSurfaces, skin->numSurfaces * sizeof( skinSurface_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3554:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_CropImage( char *name, byte **pic, int border, int *width, int *height, int lastBox[2] ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3894:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], outfilename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3925:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3937:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3947:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3989:72: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3989:98: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3989:124: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_bmp.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[2]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_bmp.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[256][4]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_jpg.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_jpg.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_pcx.c:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[48]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_pcx.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[54]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_png.c:693:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CompressedDataPtr, OrigCompressedData, Length); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_index, &buf_p[3], 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_length, &buf_p[5], 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.x_origin, &buf_p[8], 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.y_origin, &buf_p[10], 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.width, &buf_p[12], 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:89:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.height, &buf_p[14], 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:295:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (flip, src, columns*4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:296:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (src, dst, columns*4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image_tga.c:297:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dst, flip, columns*4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:385:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_ENUM" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:388:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_VALUE" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:391:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_OPERATION" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:394:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_OVERFLOW" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:397:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_UNDERFLOW" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:400:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_OUT_OF_MEMORY" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:671:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fileName[MAX_OSPATH]; // bad things if two screenshots per frame? data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:819:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:872:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:1127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imgName[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:486:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:543:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:799:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:835:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:876:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:884:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_QPATH]; // md3_lower, md3_lbelt, md3_rbelt, etc. data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:885:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; // lower.md3, belt1.md3, etc. data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:889:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:1112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:1244:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // ie: maps/tim_dm2.bsp data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:1245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char baseName[MAX_QPATH]; // ie: tim_dm2 data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:1311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:1330:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:1376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:2228:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:2229:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char green[256], data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_local.h:2230:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char blue[256] ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c:123:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_CURRENT], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c:127:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_MAP], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c:130:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_TARGET], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c:725:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c:730:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_main.c:766:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_marks.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( outPoints, inPoints, numInPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], namebuf[MAX_QPATH+20]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:338:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:991:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:999:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1003:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1007:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1018:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1022:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1026:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1030:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1471:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1479:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1483:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1487:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1498:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1502:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1506:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1510:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:2283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tagName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:980:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &iqmData->positions[vtx*3], sizeof(float) * 3); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:984:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &iqmData->texcoords[vtx*2], sizeof(float) * 2); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:998:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &blendIndexes[vtx*4], sizeof(byte) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:1003:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &blendWeights.f[vtx*4], sizeof(float) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:1006:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &blendWeights.b[vtx*4], sizeof(byte) * 4); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_scene.c:155:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, verts, numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_scene.c:231:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, &verts[numVerts * j], numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:1261:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024] = ""; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:1493:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *suf[6] = {"rt", "bk", "lf", "ft", "up", "dn"}; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:1494:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:2319:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char normalName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:2365:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char specularName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3304:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buffers[MAX_SHADER_FILES] = {NULL}; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3725:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3744:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3752:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ext, ".mtr"); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_subs.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_subs.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:273:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].xyz, sizeof(verts[i].xyz)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].normal, sizeof(verts[i].normal)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:281:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].tangent, sizeof(verts[i].tangent)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:285:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].st, sizeof(verts[i].st)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:289:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].lightmap, sizeof(verts[i].lightmap)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:293:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].color, sizeof(verts[i].color)); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:297:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].lightdir, sizeof(verts[i].lightdir)); data/iortcw-1.51.c+dfsg1/MP/code/renderer/iqm.h:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[16]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_animation.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char validBones[MDS_MAX_BONES]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_animation.c:60:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newBones[ MDS_MAX_BONES ]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_animation.c:1010:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bonePtr->matrix, tmpAxis, sizeof( tmpAxis ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_animation.c:1022:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( oldBones, bones, sizeof( bones[0] ) * header->numBones ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:266:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, buf + 8, len - 8 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:1707:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out, in, count * sizeof( *out ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:2040:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( w->lightGridData, ( void * )( fileBase + l->fileofs ), l->filelen ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:2056:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:2057:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_curve.c:311:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_curve.c:314:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_curve.c:320:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_curve.c:323:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_font.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:39:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char s_gammatable[256]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:475:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( in, temp, outWidth * outHeight * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1025:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( scaledBuffer, data, width * height * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1041:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( scaledBuffer, data, width * height * 4 ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1690:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1887:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char surfName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2034:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( skin->surfaces, parseSurfaces, skin->numSurfaces * sizeof( skinSurface_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2211:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_CropImage( char *name, byte **pic, int border, int *width, int *height, int lastBox[2] ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2549:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], outfilename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2580:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2592:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2602:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2644:72: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2644:98: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:2644:124: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_bmp.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[2]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_bmp.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[256][4]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_jpg.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_jpg.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_pcx.c:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[48]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_pcx.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[54]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_png.c:693:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CompressedDataPtr, OrigCompressedData, Length); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_index, &buf_p[3], 2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_length, &buf_p[5], 2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.x_origin, &buf_p[8], 2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.y_origin, &buf_p[10], 2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.width, &buf_p[12], 2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:89:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.height, &buf_p[14], 2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:295:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (flip, src, columns*4); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:296:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (src, dst, columns*4); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image_tga.c:297:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dst, flip, columns*4); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:310:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_ENUM" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:313:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_VALUE" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:316:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_OPERATION" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:319:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_OVERFLOW" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:322:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_UNDERFLOW" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:325:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_OUT_OF_MEMORY" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:608:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fileName[MAX_OSPATH]; // bad things if two screenshots per frame? data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:685:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:756:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:809:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:1032:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imgName[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:384:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:491:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:520:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:528:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_QPATH]; // md3_lower, md3_lbelt, md3_rbelt, etc. data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:529:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; // lower.md3, belt1.md3, etc. data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:740:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:804:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // ie: maps/tim_dm2.bsp data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:805:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char baseName[MAX_QPATH]; // ie: tim_dm2 data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:859:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:1445:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:1446:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char green[256], data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_local.h:1447:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char blue[256] ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c:227:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_CURRENT], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c:231:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_MAP], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c:234:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_TARGET], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c:600:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c:605:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_main.c:641:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_marks.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( outPoints, inPoints, numInPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], namebuf[MAX_QPATH+20]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:357:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:770:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( md3Frame_t * )( (byte *)mdc + mdc->ofsFrames ), ( md3Frame_t * )( (byte *)md3 + md3->ofsFrames ), mdcHeader.numFrames * sizeof( md3Frame_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:773:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( mdcTagName_t * )( (byte *)mdc + mdc->ofsTagNames ) + j, ( ( md3Tag_t * )( (byte *)md3 + md3->ofsTags ) + j )->name, sizeof( mdcTagName_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:818:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsTriangles, (byte *)surf + surf->ofsTriangles, cSurf->numTriangles * sizeof( md3Triangle_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:820:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsShaders, (byte *)surf + surf->ofsShaders, cSurf->numShaders * sizeof( md3Shader_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:822:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsSt, (byte *)surf + surf->ofsSt, cSurf->numVerts * sizeof( md3St_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:830:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsXyzNormals + ( sizeof( md3XyzNormal_t ) * cSurf->numVerts * i ), data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:899:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mod->mdc[lod], buffer, LittleLong( pinmodel->ofsEnd ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:1112:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mod->md3[lod], buffer, LittleLong( pinmodel->ofsEnd ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:2073:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tagName[MAX_QPATH]; //, *ch; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model_iqm.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_scene.c:151:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, verts, numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_scene.c:227:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, &verts[numVerts * j], numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade.c:351:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx, input->xyz[i], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade.c:352:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+1, temp, sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade.c:734:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tess.svars.colors, tess.vertexColors, tess.numVertexes * sizeof( tess.vertexColors[0] ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade.c:743:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tess.svars.colors, tess.vertexColors, tess.numVertexes * sizeof( tess.vertexColors[0] ) ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade_calc.c:669:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char invModulate[4]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:958:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024] = ""; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:1190:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *suf[6] = {"rt", "bk", "lf", "ft", "up", "dn"}; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:1191:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:2498:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:2557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:2996:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buffers[MAX_SHADER_FILES] = {NULL}; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:3001:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:3020:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:407:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:408:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:410:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t+1][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:411:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t+1][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:474:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:475:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:477:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t+1][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_sky.c:478:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t+1][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_subs.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_subs.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_surface.c:364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+i*6, start_points[ i % NUM_BEAM_SEGS], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_surface.c:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+i*6+3, end_points[ i % NUM_BEAM_SEGS], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_types.h:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_types.h:282:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char renderer_string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_types.h:283:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_types.h:284:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version_string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_types.h:285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extensions_string[MAX_STRING_CHARS * 4]; // TTimo - bumping, some cards have a big extension string data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_gamma.c:39:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_gamma.c:39:55: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_gamma.c:39:81: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ MAX_STRING_CHARS ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:348:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char profile[6]; // ES, ES-CM, or ES-CL data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_icon.h:7:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pixel_data[32 * 32 * 4 + 1]; data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_input.c:454:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16384] = ""; data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_snd.c:86:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stream, dma.buffer + pos, len1); data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_snd.c:91:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stream+len1, dma.buffer, len2); data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *configstrings[MAX_CONFIGSTRINGS]; data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clientCommandString[MAX_STRING_CHARS]; // valid command string for SV_Netchan_Encode data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; // name, etc data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:159:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reliableCommands[MAX_RELIABLE_COMMANDS][MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastClientCommandString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; // extracted from userinfo, high bits masked data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_QPATH]; // if not empty string, we are downloading data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:183:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *downloadBlocks[MAX_DOWNLOAD_WINDOW]; // the buffers for the download blocks data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:291:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:292:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char platform[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/server.h:293:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char installer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_bot.c:175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_bot.c:389:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->points, points, numPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_bot.c:406:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->points, points, numPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanName[64]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:72:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int plid = atoi(s); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:136:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:163:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:165:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:290:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Cvar_VariableString( "g_noTeamSwitching" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:359:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:369:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). old_gs = atoi( Cvar_VariableString( "gamestate" ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:372:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). new_gs = atoi( Cmd_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:384:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:827:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:879:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). serverBans[index].subnet = atoi(maskpos); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:913:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:922:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writebuf[128]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:985:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *mask = atoi(suffix); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1017:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addy2[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1072:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mask = atoi(Cmd_Argv(2)); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1210:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). todel = atoi(Cmd_Argv(1)); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1428:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1440:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( text, "console: " ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1480:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (text, "console_tell: "); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:114:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clientChallenge = atoi(Cmd_Argv(1)); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:238:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:335:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:379:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). version = atoi(Info_ValueForKey(userinfo, "protocol")); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:397:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi( Info_ValueForKey( userinfo, "challenge" ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:398:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). qport = atoi( Info_ValueForKey( userinfo, "qport" ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:911:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int block = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:960:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorMessage[1024]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:961:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakbuf[MAX_QPATH], *pakptr; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:966:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1025:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( testname, "updates/" ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1321:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( pArg ) < sv.checksumFeedServerId ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1344:80: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( FS_FileIsInPAK( va( sv_pureVMPaths[i], "cgame" ), &nChkSum1 ) == 1 && atoi( pArg ) == nChkSum1 ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1361:77: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( FS_FileIsInPAK( va( sv_pureVMPaths[i], "ui" ), &nChkSum1 ) == 1 && atoi( pArg ) == nChkSum1 ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1378:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nClientChkSum[i] = atoi( Cmd_Argv( nCurArg++ ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1413:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nServerChkSum[i] = atoi( Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1484:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1513:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( val ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1526:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( val ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1537:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(val); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1609:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int id = atoi(idstr); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1988:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(packet->data, encoded, packetsize); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:131:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->s.modelindex = atoi( name + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:209:62: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void SV_AdjustAreaPortalState( sharedEntity_t *ent, qboolean open ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:216:61: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). CM_AdjustAreaPortalState( svEnt->areanum, svEnt->areanum2, open ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:848:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( VMA( 1 ), VMA( 2 ), args[3] ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systemInfo[16384]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:117:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char player[1024]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:552:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char status[MAX_MSGLEN]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:558:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infostring[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:626:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infostring[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:799:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remaining[1024]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sv_outputbuf[SV_OUTPUTBUF_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:1175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/splines/math_matrix.h:94:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mat, src, sizeof( *src ) ); data/iortcw-1.51.c+dfsg1/MP/code/splines/math_vector.cpp:142:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[ 8 ][ 36 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/math_vector.cpp:149:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( s, "%.2f %.2f %.2f", x, y, z ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parseFile[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[32000]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[32000]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:347:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pi->token, *punc, l ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:463:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char line[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:358:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:359:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_parsename[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:419:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:435:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1159:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char temp_buffer[MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1160:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_VA_STRING]; // in case va is called by nested functions data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1179:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, temp_buffer, len + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1279:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value[2][BIG_INFO_VALUE]; // use two buffers so compares data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[MAX_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1380:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1517:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:379:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Com_Memcpy memcpy data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:834:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:1092:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:1272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringData[MAX_GAMESTATE_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:1707:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[32]; data/iortcw-1.51.c+dfsg1/MP/code/splines/q_splineshared.h:1713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:586:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). loadCamera( atoi( param1 ), va( (char *)"cameras/%s.camera", param2 ) ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:960:51: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = static_cast<idCameraEvent::eventType>( atoi( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:964:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:1076:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:1095:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atol( token ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:1098:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = static_cast<idCameraPosition::positionType>( atoi( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:1101:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long t = atol( token ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:1103:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long d = atol( token ); data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:1115:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:257:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:261:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%f", b ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:276:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%d", b ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:291:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%u", b ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:303:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%f", a ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:315:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%d", a ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:325:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:327:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%u", a ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[0x10000]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 32 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:252:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%.3f", num ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 32 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:266:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%d", num ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 32 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:280:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%u", num ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:502:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 2 ]; data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:530:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 2 ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/con_log.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char consoleLog[ MAX_LOG ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:336:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[MAX_EDIT_LINE]; data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c:38:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char qconsole_history[ QCONSOLE_HISTORY ][ MAX_EDIT_LINE ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char qconsole_line[ MAX_EDIT_LINE ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c:492:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[ MAXPRINTMSG ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:50:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char binaryPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char installPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:218:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if( ( f = fopen( pidFile, "r" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:220:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pidBuffer[ 64 ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:228:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pid = atoi( pidBuffer ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:240:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if( ( f = fopen( pidFile, "w" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:259:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[1024]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:260:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:356:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[ MAXPRINTMSG ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:455:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:526:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libPath[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:692:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char commandLine[ MAX_STRING_CHARS ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char homePath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char steamPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gogPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:200:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( "/dev/urandom", "r" ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:277:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen( ospath, mode ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:315:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fifo = fopen( ospath, "w+" ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:332:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cwd[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH], newsubdirs[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:361:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:420:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:423:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list[MAX_FOUND_FILES]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:580:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ 1024 ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:612:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = open( ospath, O_CREAT | O_TRUNC | O_WRONLY, 0640 ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:631:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char execBuffer[ 1024 ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:633:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *execArgv[ 16 ]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1012:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char exit_cmdline[MAX_CMD] = ""; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1086:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[20]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1087:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:1088:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[MAX_CMD]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char homePath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char steamPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:54:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gogPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:101:2: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szPath[MAX_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:280:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s_userName[1024]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:284:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_userName, "player" ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:288:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_userName, "player" ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:316:2: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szPathOrig[MAX_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:374:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char base[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:404:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dir[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:432:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen( ospath, mode ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:468:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cwd[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH], newsubdirs[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:494:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:573:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:576:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list[MAX_FOUND_FILES]; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:746:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ 1024 ]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:48:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char archivedir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:60:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ex_argv[MAX_EX_ARGC]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filebase[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text2[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:180:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[4096]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:217:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qdir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:218:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gamedir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:219:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writedir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:300:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:314:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:327:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char archivename[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:644:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:651:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(fn, mode); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:724:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)buffer)[length] = 0; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:784:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)buffer)[length] = 0; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[128]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:886:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dest, path, src-path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:967:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atol (str); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:1089:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:1109:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dir, path, ofs - path ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h:49:28: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #pragma intrinsic( memset, memcpy ) data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h:81:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char qdir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h:82:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char gamedir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h:83:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char writedir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char com_token[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.h:134:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char archivedir[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:31:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outputFilename[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:190:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *asmFiles[MAX_ASM_FILES]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:191:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *asmFileNames[MAX_ASM_FILES]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:208:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:210:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:595:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:669:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( lineBuffer, data, (p - data) ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:733:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:743:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sym, token, i ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:766:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sym, token+i+1, j-i-1 ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:923:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1067:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imageName[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1322:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( imageName, ".map" ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1347:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imageName[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1356:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( imageName, ".qvm" ); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1427:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:1552:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( outputFilename, "q3asm" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:48:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:77:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:126:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:135:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[2][MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gameList[4096]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:281:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:290:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:306:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.accuracy = atoi( UI_Argv( 3 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:307:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.impressives = atoi( UI_Argv( 4 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:308:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.excellents = atoi( UI_Argv( 5 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:309:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.defends = atoi( UI_Argv( 6 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:310:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.assists = atoi( UI_Argv( 7 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:311:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.gauntlets = atoi( UI_Argv( 8 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:312:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.baseScore = atoi( UI_Argv( 9 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:313:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.perfects = atoi( UI_Argv( 10 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:314:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.redScore = atoi( UI_Argv( 11 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:315:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.blueScore = atoi( UI_Argv( 12 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:316:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( UI_Argv( 13 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:317:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.captures = atoi( UI_Argv( 14 ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:408:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader1[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:409:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader2[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:410:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader3[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_botInfos[MAX_BOTS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_arenaInfos[MAX_ARENAS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:94:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( token, "<NULL>" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ARENAS_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:166:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( filename, "scripts/" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:201:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.mapList[uiInfo.mapCount].Timelimit = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:209:54: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.mapList[uiInfo.mapCount].AxisRespawnTime = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:217:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.mapList[uiInfo.mapCount].AlliedRespawnTime = atoi( str ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BOTS_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:307:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:308:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:327:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( filename, "scripts/" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:232:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:697:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *teamMembers[TEAM_MEMBERS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:732:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *maps[MAPS_PER_TIER]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:743:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:774:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char motd[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:779:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:780:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:792:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:793:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lines[MAX_SERVERSTATUS_LINES][4]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:794:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SERVERSTATUS_TEXT]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:795:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pings[MAX_CLIENTS * 3]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:837:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerNames[MAX_CLIENTS][MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:838:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamNames[MAX_CLIENTS][MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:854:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *demoList[MAX_DEMOS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:858:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *movieList[MAX_MOVIES]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:873:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverStatusAddress[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:879:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char findPlayerName[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:880:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foundPlayerServerAddresses[MAX_FOUNDPLAYER_SERVERS][MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:881:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foundPlayerServerNames[MAX_FOUNDPLAYER_SERVERS][MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:891:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char q3HeadNames[MAX_PLAYERMODELS][64]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_local.h:900:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnPoints[MAX_SPAWNPOINTS][MAX_SPAWNDESC]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:182:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char translated_yes[4], translated_no[4]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:326:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char staticbuf[2][MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:578:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:683:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:710:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &color_save[0], &newColor[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:783:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:791:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &aux_color[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:802:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &aux_color[0], &next_color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:843:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1098:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUFILE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1362:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cl_language = atoi( UI_Cvar_VariableString( "cl_language" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1367:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[256]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1444:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastName[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1822:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1823:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[256]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1824:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[256]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1834:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( model, "multi" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:1836:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( model, "multi_axis" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headmodel[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2419:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2424:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.teamLeader = atoi( Info_ValueForKey( info, "tl" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2425:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team = atoi( Info_ValueForKey( info, "t" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2427:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). count = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2438:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team2 = atoi( Info_ValueForKey( info, "t" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2491:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[4096]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2571:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *lines[64]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:2620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[140]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3166:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char masterstr[2], cvarname[sizeof("sv_master1")]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3446:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3520:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sglist[4096]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3560:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char movielist[4096]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3592:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demolist[NAMEBUFSIZE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3593:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoExt[32]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3668:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4041:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4055:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.spawnCount = atoi( s ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4070:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS], overviewImage[MAX_STRING_CHARS], desc[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4102:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numobjectives = atoi( s ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4144:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( UI_Cvar_VariableString( "r_inGameVideo" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4307:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4534:42: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static void UI_UpdateVoteFlags( qboolean open ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4536:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( open ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4650:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[17]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4899:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4900:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4923:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4932:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4933:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5025:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( UI_Cvar_VariableString( "ui_isSpectator" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5081:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). selectType = atoi( param ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5082:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itemIndex = atoi( param2 ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5089:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). indexNum = atoi( name ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5099:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). indexNum = atoi( name ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5438:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clients = atoi( Info_ValueForKey( info, "clients" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5450:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maxClients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5461:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). friendlyFire = atoi( Info_ValueForKey( info, "friendlyFire" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5478:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maxlives = atoi( Info_ValueForKey( info, "maxlives" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5489:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). tourney = atoi( Info_ValueForKey( info, "tourney" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5500:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). punkbuster = atoi( Info_ValueForKey( info, "punkbuster" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5516:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). antilag = atoi( Info_ValueForKey( info, "g_antilag" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5532:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi( Info_ValueForKey( info, "gametype" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5800:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH + 2]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5801:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6076:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUDEFFILE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6094:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6095:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hostname[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6096:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char clientBuff[32]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6097:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char pingstr[10]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6120:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). antilag = atoi( Info_ValueForKey( info, "g_antilag" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6121:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ping = atoi( Info_ValueForKey( info, "ping" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6131:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int nettype = atoi(Info_ValueForKey(info, "nettype")); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6147:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi( Info_ValueForKey( info, "gametype" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6165:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). punkbuster = atoi( Info_ValueForKey( info, "punkbuster" ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:6280:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; // com_errorMessage can go up to 4096 data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7304:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char lastLoadingText[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dlSizeBuf[64], totalSizeBuf[64], xferRateBuf[64], dlTimeBuf[64]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7442:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[256]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7446:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7485:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ps[60]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:869:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( legs.torsoAxis, torso.axis, sizeof( torso.axis ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:989:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1116:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animModelInfo->version = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1168:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1187:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1194:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1214:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1221:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].animBlend = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1272:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skip = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1275:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1283:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1310:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1344:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_public.h:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servername[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_public.h:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateInfoString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_public.h:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char messageString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:93:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[MEM_POOL_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:241:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char strPool[STRING_POOL_SIZE]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:344:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:346:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:367:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:369:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:493:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *i = atoi( token ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:641:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curscript[64]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1495:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &item->window.rectClient, &rectFrom, sizeof( rectDef_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1496:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &item->window.rectEffects, &rectTo, sizeof( rectDef_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1634:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). DC->feederAddItem( t->special, name, atoi( val ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1687:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024], *p; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024], *p; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:1726:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:2382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:2408:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:2471:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3286:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[256]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3330:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3336:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( newColor, &parent->disableColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3344:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3418:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3420:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3531:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3555:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3607:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3631:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3812:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[256]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3935:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_nameBind1[32]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3936:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_nameBind2[32]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3962:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( g_nameBind1, "???" ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3978:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:4018:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:5782:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &item->colorRanges[item->numColors], &color, sizeof( color ) ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:121:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[MAX_SCRIPT_ARGS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:215:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvarList[MAX_MULTI_CVARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:216:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvarStr[MAX_MULTI_CVARS]; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.h:297:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *onKey[255]; // NERVE - SMF - execs commands when a key is pressed data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.c:19:36: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define FOPEN_FUNC(filename, mode) fopen(filename, mode) data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.c:109:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(filename, mode_fopen); data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.h:54:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen64 fopen data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.h:59:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen64 fopen data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/ioapi.h:64:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen64 fopen data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/unzip.c:1277:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szCurrentFileName[UNZ_MAXFILENAMEINZIP+1]; data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/unzip.c:1493:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source[12]; data/iortcw-1.51.c+dfsg1/SP/code/asm/snapvector.c:31:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char ssemask[16] __attribute__((aligned(16))) = data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:181:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( trace, &enttrace, sizeof( bsp_trace_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:336:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:342:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *value = atoi( buf ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:521:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bspworld.dentdata, botimport.BSPEntityData(), bspworld.entdatasize ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_debug.c:259:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bboxcorners[4], bboxcorners[0], sizeof( vec3_t ) * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_debug.c:685:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &reach, &( *aasworld ).reachability[settings->firstreachablearea + index], sizeof( aas_reachability_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_def.h:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_def.h:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_def.h:246:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *configstrings[MAX_CONFIGSTRINGS]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_entity.c:180:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( info, &( *defaultaasworld ).entities[entnum].i, sizeof( aas_entityinfo_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_file.c:414:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ( *aasworld ).bspchecksum = atoi( LibVarGetString( "sv_mapChecksum" ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[1024]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:170:38: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( *aasworld ).configstrings[i] = (char *) GetMemory( strlen( configstrings[i] ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aasfile[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char this_mapname[MAPNAME_LEN], intstr[4]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_optimize.c:169:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( optface, face, sizeof( aas_face_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_optimize.c:203:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( optarea, area, sizeof( aas_area_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:2607:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[MAX_EPAIRKEY], targetname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:2608:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:2626:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). AAS_BSPModelMinsMaxsOrigin( atoi( model + 1 ), angles, mins, maxs, origin ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:2660:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). AAS_BSPModelMinsMaxsOrigin( atoi( model + 1 ), angles, mins, maxs, origin ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:2763:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_EPAIRKEY], classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:2789:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:3138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:3166:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:3373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[MAX_EPAIRKEY], targetname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:3374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:3396:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_reach.c:3852:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.c:952:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.c:1112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.c:1907:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( reach, &( *aasworld ).reachability[num], sizeof( aas_reachability_t ) );; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_route.c:2202:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( *aasworld ).areavisibility[i], buf, size ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routetable.c:255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routetable.c:515:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routetable.c:809:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( area_parents[i]->visibleParents, visibleParents, area_parents[i]->numVisibleParents * sizeof( unsigned short int ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_routetable.c:1195:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char destVisLookup[MAX_PARENTS]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_CHATTYPE_NAME]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; //name of the bot data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatmessage[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:200:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:593:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:888:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str1, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:937:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( &ptr[strlen( ptr )], "%cv%ld%c", ESCAPE_CHAR, token.intvalue, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1763:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatmessagestring[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1764:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namebuffer[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1944:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chatmessagestring[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcmessage[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2603:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bestmatch, &match, sizeof( bot_match_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.h:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_MESSAGE_SIZE]; //message data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.h:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_gen.c:123:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( rankings, ranks, sizeof( float ) * numranks ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:81:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[32]; //classname of the item data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; //name of the item data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; //model of the item data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:676:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:1007:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:1038:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &gs->goalstack[gs->goalstacktop], goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:1088:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &gs->goalstack[gs->goalstacktop], sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:1107:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &gs->goalstack[gs->goalstacktop - 1], sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_move.c:534:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[MAX_EPAIRKEY], model[MAX_EPAIRKEY]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_move.c:547:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.c:203:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.c:252:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &wc->weaponinfo[weaponinfo.number], &weaponinfo, sizeof( weaponinfo_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.c:299:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &wc->weaponinfo[i].proj, &wc->projectileinfo[j], sizeof( projectileinfo_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.c:398:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( weaponinfo, &weaponconfig->weaponinfo[weapon], sizeof( weaponinfo_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.h:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.h:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.h:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.h:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weap.h:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char projectile[MAX_STRINGFIELD]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:582:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( filename, "wb" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.h:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ea.c:401:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( input, bi, sizeof( bot_input_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ea.c:426:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bi, init, sizeof( bot_input_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/botai.h:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/botlib.h:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_LOGFILENAMESIZE]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.c:78:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). logfile.fp = fopen(ospath, "wb"); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:289:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( t, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:345:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, source->tokens, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:678:19: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. define->name = (char *) GetMemory(strlen(builtin[i].string) + 1); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:708:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token->string, "%d", deftoken->line ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:959:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2434:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%ld", labs( value ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2460:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%1.2f", fabs( value ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2540:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%ld", labs( value ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2570:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( token.string, "%1.2f", fabs( value ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2756:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &source->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2788:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2798:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "string" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2801:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "literal" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2804:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "number" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2807:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "name" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2810:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "punctuation" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2819:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "decimal" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2822:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "hex" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2825:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "octal" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2828:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "binary" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2831:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " long" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2834:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " unsigned" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2837:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " float" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2840:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " integer" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2905:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, &tok, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; //file name of the script data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.h:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char includepath[MAX_QPATH]; //path to include files data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:165:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char basefolder[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:844:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &script->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:858:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, &script->token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:920:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &script->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:951:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:961:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "string" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:964:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "literal" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:967:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "number" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:970:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "name" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:973:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "punctuation" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:982:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "decimal" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:985:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "hex" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:988:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "octal" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:991:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( str, "binary" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:994:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " long" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:997:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " unsigned" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1000:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " float" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1003:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( str, " integer" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1073:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( token, &tok, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1113:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &script->token, token, sizeof( token_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1330:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1349:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( filename, "rb" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.h:173:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKEN]; //available token data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.h:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; //file name of the script data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_struct.c:228:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( (char *)p )[MAX_STRINGFIELD - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_struct.c:363:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test[4]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:52:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trap_SendClientCommand( va( "gc %i %i", targetNum, atoi( test ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:216:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:217:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_consolecmds.c:362:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamStr[80], classStr[80], weapStr[80]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:45:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systemChat[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:46:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChat1[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:47:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChat2[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:183:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:247:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16], *ptr; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:842:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char printme[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:861:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char printme[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:1054:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:1570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pickupText[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:2001:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:2539:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rendererinfos[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:3026:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char deploytime[128]; // JPW NERVE data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:3539:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:3581:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_effects.c:606:63: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int CG_GetOriginForTag( centity_t *cent, refEntity_t *parent, char *tagName, int startIndex, vec3_t org, vec3_t axis[3] ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:545:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:780:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:1473:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:1864:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:2084:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->refEnt, &ent, sizeof( refEntity_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:2459:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) == s1->number ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:2464:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pi = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:49:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetName[32]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char attackerName[32]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:232:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( attackerName, "noname" ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1847:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1858:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_flamethrower.c:1292:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[512]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_flamethrower.c:1321:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char personality[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:83:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:84:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:162:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:318:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). vars[v++] = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hunkBuf[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:387:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). expectedHunk = atoi( hunkBuf ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_QPATH]; // md3_lower, md3_lbelt, md3_rbelt, etc. data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; // lower.md3, belt1.md3, etc. data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dl_stylestring[64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:484:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char validOldPos[MAX_OLD_POS]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:570:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hSkinName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:814:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoScreenText[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:825:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char killerName[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:826:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spectatorList[MAX_STRING_CHARS]; // list of names data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:844:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char centerPrint[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:963:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testModelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:987:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oidPrint[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1477:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1539:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char redTeam[MAX_QPATH]; // A team data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1541:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blueTeam[MAX_QPATH]; // B team data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1547:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteString[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamVoteString[2][MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1573:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChatMsgs[TEAMCHAT_HEIGHT][TEAMCHAT_WIDTH * 3 + 1]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1578:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemPrintNames[MAX_ITEMS][32]; //----(SA) added data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1881:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char systemChat[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1882:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char teamChat1[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:1883:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char teamChat2[256]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_local.h:2130:65: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. int CG_GetOriginForTag( centity_t * cent, refEntity_t * parent, char *tagName, int startIndex, vec3_t org, vec3_t axis[3] ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_localents.c:650:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &( nle->leType ), &( le->leType ), sizeof( localEntity_t ) - 2 * sizeof( localEntity_t * ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:490:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:501:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.localServer = atoi( var ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:583:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:594:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:605:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:620:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:646:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). entnum = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:653:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cent->dl_frame = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:660:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cent->dl_sound = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:663:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cent->dl_atten = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:695:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:723:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data, start, len ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:750:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:793:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:849:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char items[MAX_ITEMS + 1]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:850:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1086:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1089:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char items[MAX_ITEMS + 1]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1090:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *sb_nums[11] = { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1461:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1473:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1565:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parm1[MAX_QPATH], parm2[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1585:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parm[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1602:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUFILE]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1867:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUDEFFILE]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:2092:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:2178:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:2350:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_marks.c:263:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mark->verts, verts, mf->numPoints * sizeof( verts[0] ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:576:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:716:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:735:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:869:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:1062:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:1085:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:1097:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:1235:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:1331:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:102:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *shaderAnimNames[MAX_SHADER_ANIMS] = { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:1602:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:1636:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numparticles = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:1639:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). turb = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_particles.c:1642:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). snum = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[100000]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cg_customSoundNames[MAX_CUSTOM_SOUNDS] = { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tags[2] = {"tag_footleft", "tag_footright"}; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:398:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:427:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:451:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namefromskin[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:623:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namefromskin[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:624:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:625:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:677:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scaleString[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1205:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char namefromskin[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1206:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1248:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( v ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1538:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.botSkill = atoi( v ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1542:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.handicap = atoi( v ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1546:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.wins = atoi( v ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1550:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.losses = atoi( v ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:1554:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.team = atoi( v ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4529:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:4874:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( legs.torsoAxis, torso.axis, sizeof( torso.axis ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:5541:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( or->axis, tempAxis, sizeof( vec3_t ) * 3 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_players.c:5594:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( or->axis, tempAxis, sizeof( vec3_t ) * 3 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamstr[32]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:301:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( teamstr, "axis_desc" ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:303:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( teamstr, "allied_desc" ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:309:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( buf && atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:310:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( buf ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:322:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi( Info_ValueForKey( s, "status" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:370:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:48:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numScores = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:53:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.teamScores[0] = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:54:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.teamScores[1] = atoi( CG_Argv( 3 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:59:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].client = atoi( CG_Argv( i * 6 + 4 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:60:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].score = atoi( CG_Argv( i * 6 + 5 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:61:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].ping = atoi( CG_Argv( i * 6 + 6 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:62:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].time = atoi( CG_Argv( i * 6 + 7 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:63:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].scoreFlags = atoi( CG_Argv( i * 6 + 8 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:64:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). powerups = atoi( CG_Argv( i * 6 + 9 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:101:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numSortedTeamPlayers = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:110:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client = atoi( CG_Argv( i * 6 + 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:119:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].location = atoi( CG_Argv( i * 6 + 3 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:120:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].health = atoi( CG_Argv( i * 6 + 4 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:121:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].armor = atoi( CG_Argv( i * 6 + 5 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:122:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].curWeapon = atoi( CG_Argv( i * 6 + 6 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:123:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].powerups = atoi( CG_Argv( i * 6 + 7 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:141:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.gametype = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:143:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.dmflags = atoi( Info_ValueForKey( info, "dmflags" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:144:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamflags = atoi( Info_ValueForKey( info, "teamflags" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:145:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.fraglimit = atoi( Info_ValueForKey( info, "fraglimit" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:146:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.capturelimit = atoi( Info_ValueForKey( info, "capturelimit" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:147:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.timelimit = atoi( Info_ValueForKey( info, "timelimit" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:148:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.maxclients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:184:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.playTimeH = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:186:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.playTimeM = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:188:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.playTimeS = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:192:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numObjectivesFound = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:194:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numObjectives = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:198:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numSecretsFound = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:200:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numSecrets = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:204:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numTreasureFound = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:206:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numTreasure = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:210:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numArtifactsFound = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:212:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numArtifacts = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:216:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.attempts = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:233:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). warmup = atoi( info ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:260:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadestart = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:262:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeduration = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:301:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). token = COM_Parse( (char **)&info ); time = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:319:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( CG_ConfigString( CS_SCORES1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:320:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( CG_ConfigString( CS_SCORES2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:321:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( CG_ConfigString( CS_LEVEL_START_TIME ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:332:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.warmup = atoi( CG_ConfigString( CS_WARMUP ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char originalShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:343:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeOffset[16]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:385:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:406:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:408:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:410:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:412:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteTime = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:415:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteYes = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:418:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteNo = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:425:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteTime[num - CS_TEAMVOTE_TIME] = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:428:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteYes[num - CS_TEAMVOTE_YES] = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:431:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteNo[num - CS_TEAMVOTE_NO] = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:438:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.intermissionStarted = atoi( str ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:555:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[10000]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SAY_TEXT]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:801:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). qboolean startBlack = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:818:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int time = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:915:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader1[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:916:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader2[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:917:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader3[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:944:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int team = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:960:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeTime = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:975:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeTime = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:983:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int time = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:990:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int time = atoi( CG_Argv( 2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:172:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->currentState, state, sizeof( entityState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:188:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char prevmap[64] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:189:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curmap[64]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:292:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ¢->nextState, es, sizeof( entityState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_sound.c:343:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). sound.shakeDuration = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_sound.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char soundFiles[MAX_SOUND_FILES][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_sound.c:374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_sound.c:376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_trails.c:681:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. mid.modulate[l] = ( unsigned char )( mod[l] / 4.0 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_view.c:1278:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) ) { // this camera has fog data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_view.c:1302:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fogStart = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_view.c:1309:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fogEnd = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:869:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:931:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:937:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:955:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].loopFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:972:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:978:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:986:43: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). wi->weapAnimations[i].moveSpeed |= ( ( atoi( token ) ) << 8 ); // use 2nd byte for draw bits data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:1011:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH], comppath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4285:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bank = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_weapons.c:4347:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_avi.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:215:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). index = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:254:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cl.gameState.stringData + cl.gameState.dataCount, dup, len + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:276:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char bigConfigString[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:874:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outstr[256]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:899:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) == memusage ) { // if it is the same, abort this process data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:346:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 32); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 16); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:384:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 32); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:417:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst, src, 8); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:418:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst+spl, src+8, 8); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cin.c:1475:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_console.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_console.c:345:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tbuf, con.text, CON_TEXTSIZE * sizeof( short ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_input.c:79:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k = atoi( c ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_input.c:103:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). b->downtime = atoi( c ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_input.c:116:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). k = atoi( c ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_input.c:139:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uptime = atoi( c ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1306:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1334:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str, edit->buffer + prestep, drawLen ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1578:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_EDIT_LINE-1]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1827:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tinystr[5]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1984:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[1024]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2157:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ MAX_STRING_CHARS ], *p = buf, *end; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2185:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[1024]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2484:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char consoleSaveBuffer[ MAX_CONSOLE_SAVE_BUFFER ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2518:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). historyEditLines[ i ].cursor = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2523:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). historyEditLines[ i ].scroll = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2528:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numChars = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:144:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_reconnectArgs[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:145:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_oldGame[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:158:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:243:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int id = atoi(idstr); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:260:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int id = atoi(idstr); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:297:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int id = atoi(Cmd_Argv(2)); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:567:32: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (encio == NULL) encio = fopen("voip-outgoing-encoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:570:32: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (decio == NULL) decio = fopen("voip-outgoing-decoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:712:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char demoName[MAX_QPATH]; // compiler bug workaround data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:714:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:885:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ MAX_STRING_CHARS ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1068:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoExt[ 16 ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1084:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1085:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1088:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char retry[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1109:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). protocol = atoi(ext_test + ARRAY_LEN(DEMOEXT)); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char v[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1608:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nums[64]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char server[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1830:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_RCON_MESSAGE]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1878:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cMsg[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char missingfiles[1024]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_INFO_STRING + 10]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2610:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi(c); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2615:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ver = atoi(strver); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2668:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clc.challenge = atoi(Cmd_Argv(1)); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2702:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi(c); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2989:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2990:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverName[ MAX_OSPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3075:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char groupStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemStr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3165:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cacheIndex = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3175:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3353:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dllName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3464:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char binName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3510:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). doexit = (qboolean)( atoi( Cmd_Argv( 3 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3530:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[ MAX_OSPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3598:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buff[ QKEY_SIZE ]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3953:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->clients = atoi( Info_ValueForKey( info, "clients" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3956:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->maxClients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3958:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->gameType = atoi( Info_ValueForKey( info, "gametype" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3959:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->netType = atoi( Info_ValueForKey( info, "nettype" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3960:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->minPing = atoi( Info_ValueForKey( info, "minping" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3961:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->maxPing = atoi( Info_ValueForKey( info, "maxping" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3962:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->g_humanplayers = atoi( Info_ValueForKey( info, "g_humanplayers" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3963:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->g_needpass = atoi( Info_ValueForKey( info, "g_needpass" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3964:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). server->allowAnonymous = atoi( Info_ValueForKey( info, "sv_allowAnonymous" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4000:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4026:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). prot = atoi( Info_ValueForKey( infoString, "protocol" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4205:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[1024], *masteraddress; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4351:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ((count = Cmd_Argc()) < 3 || (masterNum = atoi(Cmd_Argv(1))) < 0 || masterNum > MAX_MASTER_SERVERS) data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4362:4: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(command, "sv_master%d", i); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4380:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(command, "sv_master%d", masterNum); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4623:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &pingptr->adr, &to, sizeof( netadr_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4639:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4694:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &cl_pinglist[j].adr, &server[i].adr, sizeof( netadr_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4813:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chs[3]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:33:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *svc_strings[256] = { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:351:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:356:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cl.serverId = atoi( Info_ValueForKey( systemInfo, "sv_serverid" ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:376:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cl_connectedToCheatServer = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:452:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clc.sv_allowDownload = atoi(Info_ValueForKey(serverInfo, data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:471:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldGame[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:508:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cl.gameState.stringData + cl.gameState.dataCount, s, len + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:569:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[MAX_MSGLEN]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:710:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char encoded[4000]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:804:29: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (encio == NULL) encio = fopen("voip-incoming-encoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:807:29: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (decio == NULL) decio = fopen("voip-incoming-decoded.bin", "wb"); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[16]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:361:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[256]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_ui.c:38:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cl_cdkey[34]; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_ui.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; // extracted from CS_SERVERINFO data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char limboChatMsgs[LIMBOCHAT_HEIGHT][LIMBOCHAT_WIDTH * 3 + 1]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servername[MAX_OSPATH]; // name of server from original connect (used by reconnect) data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:200:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverMessage[MAX_STRING_TOKENS]; // for display on connection dialog data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reliableCommands[MAX_RELIABLE_COMMANDS][MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverCommands[MAX_RELIABLE_COMMANDS][MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadTempName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:231:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadURL[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sv_dlURL[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:241:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadList[MAX_INFO_STRING]; // list of paks we need to download data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:258:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char timeDemoDurations[ MAX_TIMEDEMO_DURATIONS ]; // log of frame durations data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:318:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostName[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapName[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:320:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char game[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:368:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateChallenge[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:369:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateInfoString[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/client/client.h:385:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cl_oldGame[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:56:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t name[256]; data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:61:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t identity[256]; data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:63:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char context[256]; data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:64:2: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t description[2048]; data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[256]; data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:159:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(lm->context, context, len); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.c:42:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.c:44:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.c:62:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rtn = codec->open(localName); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.c:99:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). rtn = codec->open(altName); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.h:63:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). CODEC_OPEN open; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec_wav.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[5]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec_wav.c:133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dump[16]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:41:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s_backgroundLoop[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[4][16]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem[2][16]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:174:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[0], "16bit"); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:175:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[1], "adpcm"); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:176:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[2], "daub4"); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:177:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(type[3], "mulaw"); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:178:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem[0], "paged out"); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:179:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(mem[1], "resident "); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:1292:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. rawsamples[dst].left = ((char *)data)[src*2] * intVolumeLeft; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:1293:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. rawsamples[dst].right = ((char *)data)[src*2+1] * intVolumeRight; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_local.h:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char soundName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_local.h:76:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern unsigned char s_entityTalkAmplitude[MAX_CLIENTS]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_local.h:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loop[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_mix.c:258:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char s_entityTalkAmplitude[MAX_CLIENTS]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:2020:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s_backgroundLoop[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:2715:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devicenames[16384] = ""; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:2834:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char inputdevicenames[16384] = ""; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:237:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:423:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( client->ps.weapons, weaponInfo->startingWeapons, sizeof( weaponInfo->startingWeapons ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:728:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loading[4]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:745:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( strlen( loading ) > 0 && atoi( loading ) != 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:749:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !( g_reloading.integer ) && atoi( loading ) == 2 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.h:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *soundScripts[MAX_AI_EVENT_SOUNDS]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_debug.c:49:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *aifuncs[MAX_AIFUNCS]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_debug.c:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_events.c:163:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_fight.c:271:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( enemies, sortedEnemies, sizeof( int ) * enemyCount ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_func_boss1.c:345:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *heinrichSounds[MAX_HEINRICH_SOUNDS] = { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:291:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int1 = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:293:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int2 = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:295:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eInt = atoi( event->params ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:404:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:605:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cs->castScriptEvents, cast_temp_events, sizeof( cast_script_event_t ) * numEventItems ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loading[4]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:465:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( strlen( loading ) > 0 && atoi( loading ) != 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:515:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). duration = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:713:57: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->castScriptStatus.scriptNoAttackTime = level.time + atoi( params ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:759:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, tokens[3][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:804:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numLoops = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:926:62: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). endtime = cs->castScriptStatus.castScriptStackChangeTime + atoi( tokens[1] ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1053:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1055:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). amt = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1119:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int spillover = atoi( token ) - ammoTable[weapon].maxclip; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1127:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].client->ps.ammoclip[weapon] = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1240:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].client->ps.stats[STAT_ARMOR] += atoi( params ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1676:62: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return ( ( cs->castScriptStatus.castScriptStackChangeTime + atoi( token ) ) < level.time ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1724:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, lastToken[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1734:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bufferIndex = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1751:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] += atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1756:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] < atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1764:45: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] > atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1772:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] != atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1780:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] == atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1788:48: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] |= ( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1793:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] &= ~( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1798:52: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( cs->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1806:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !( cs->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1814:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1819:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->scriptAccumBuffer[bufferIndex] = rand() % atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1904:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1909:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mof = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1952:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). level.numObjectives = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:1985:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lvl = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2319:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( pch ) ) { // there's a 'time' specified data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2320:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). exitTime = atoi( pch ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2399:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cs->castScriptStatus.scriptNoSightTime = level.time + atoi( params ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2775:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].health = atoi( params ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2776:60: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). g_entities[cs->entityNum].client->ps.stats[STAT_HEALTH] = atoi( params ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2812:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2845:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2857:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeupTime = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2873:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2901:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeoutTime = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2931:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadetime = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:2946:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:3021:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char condition[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_sight.c:285:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &clientHeadTags[srcent->s.number], &or, sizeof( orientation_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_think.c:1225:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( move->touchents, pm.touchents, sizeof( pm.touchents ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_think.c:1274:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ucmd, &cs->lastucmd, sizeof( usercmd_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:79:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:106:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:135:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:154:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:166:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:187:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:199:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:219:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:221:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:236:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:267:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mapname[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:371:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:414:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:455:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:494:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:556:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:579:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( name, "[world]" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:660:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:723:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:766:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:821:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:886:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:939:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:1030:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:177:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &cp->goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestring[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyarea[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addressedto[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:376:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botname[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:473:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE], netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:474:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:589:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:629:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:665:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:865:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:993:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1046:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1077:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char goalname[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1224:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1245:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &tmpgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1324:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE], teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enemy[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1432:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flag[128], netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:65:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeswitch[MAX_NODESWITCHES + 1][144]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:291:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:463:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:490:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:540:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:570:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:637:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( buf, " to " ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:677:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->curpatrolpoint->goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:761:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:818:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( goal, &bs->lead_teamgoal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:1263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:125:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skin[128], *p; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:208:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->teamgoal, &ctf_redflag, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:209:12: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. } else { memcpy( &bs->teamgoal, &ctf_blueflag, sizeof( bot_goal_t ) );} data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:307:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128] = {0}; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:559:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:929:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->teamgoal, goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:994:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bestgoal, &goal, sizeof( bot_goal_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1931:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1932:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_INFO_STRING], tmpmodel[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[128], classname[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetname[10][128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2228:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[128], model[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2241:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2308:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelindex = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2524:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botname[MAX_NETNAME], message[MAX_MESSAGE_SIZE], netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2622:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2764:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gender[144], name[144]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2765:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2856:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2885:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi( model + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:155:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( state, &ent->client->ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:178:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( state, &ent->s, sizeof( entityState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:210:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vars[MAX_MATCHVARIABLES]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:530:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], *args; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:625:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[144], name[144], gender[144]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:655:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->settings, settings, sizeof( bot_settings_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:779:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &settings, &bs->settings, sizeof( bot_settings_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:780:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ps, &bs->cur_ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:800:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->cur_ps, &ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:801:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &bs->settings, &settings, sizeof( bot_settings_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1051:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1133:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( buf, "20" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.h:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.h:198:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamleader[MAX_NETNAME]; //netname of the team leader data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.h:208:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subteam[32]; //sub team name data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:79:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:89:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:145:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( Info_ValueForKey( buf, "t" ) ) == TEAM_SPECTATOR ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamchat[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:185:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:207:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:290:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:439:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:57:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char defineStrings[10000]; // stores the actual strings data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:593:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animModelInfo->version = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:645:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:664:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:671:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:691:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:700:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].animBlend = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:715:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].priority = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:765:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skip = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:768:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:776:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:803:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void BG_ParseConditionBits( char **text_pp, animStringItem_t *stringTable, int condIndex, int result[RESULT_SIZE] ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:807:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char currentString[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1036:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). command->animDuration[partIndex] = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1079:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) > 7 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1080:87: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). BG_AnimParseError( "BG_ParseCommands: showpart number '%d' is too big! (max 8)", atoi( token ) ) ; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1083:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). command->accShowBits &= atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1090:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( atoi( token ) > 7 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1091:87: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). BG_AnimParseError( "BG_ParseCommands: hidepart number '%d' is too big! (max 8)", atoi( token ) ) ; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1094:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). command->accHideBits &= atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1233:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &defineStr[ANIM_COND_ENEMY_WEAPON][0], &defineStr[ANIM_COND_WEAPON][0], sizeof( animStringItem_t ) * MAX_ANIM_DEFINES ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:353:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:353:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:359:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:359:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *) dest)[i] = ((char *) src)[i]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:375:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( (char *)dest )[count] = c; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:380:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy( void *dest, const void *src, size_t count ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:382:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( (char *)dest )[count] = ( (char *)src )[count]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:382:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ( (char *)dest )[count] = ( (char *)src )[count]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:1035:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi( const char *string ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:1694:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char convert[24]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:1811:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconvert[20]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:1812:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fconvert[20]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:101:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi( const char *string ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:112:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy( void *dest, const void *src, size_t count ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_misc.c:4348:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_public.h:1060:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_public.h:1233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *world_model[MAX_ITEM_MODELS]; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_public.h:1639:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelname[MAX_QPATH]; // name of the model data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char g_botInfos[MAX_BOTS][MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char g_arenaInfos[MAX_ARENAS][MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:417:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:478:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:483:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). settings.skill = atoi( Info_ValueForKey( userinfo, "skill" ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:649:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:650:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:651:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:670:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skill = Com_Clamp( 1, 5, atoi( string ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_bot.c:681:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi( string ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1213:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[100000]; // <- was causing callstacks >64k data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH], modelname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldname[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1313:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( userinfo, "\\name\\badinfo" ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1320:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1328:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1336:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1361:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->pers.maxHealth = atoi( Info_ValueForKey( userinfo, "handicap" ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:1492:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:2056:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). anim->moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_client.c:2063:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). anim->stepGap = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1000]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:127:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char line[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:139:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( line + len, arg, tlen ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanName[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:192:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:265:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). amount = atoi( amt ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:708:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.playerType = atoi( ptype ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:709:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.playerWeapon = atoi( weap ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:710:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.playerPistol = atoi( pistol ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:711:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.playerItem = atoi( grenade ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:712:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->sess.playerSkin = atoi( skinnum ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:741:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:742:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ptype[4], weap[4], pistol[4], grenade[4], skinnum[4]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:793:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:955:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:957:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SAY_TEXT]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:958:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[64]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1069:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1121:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). order = atoi( arg ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg1[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1167:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg2[MAX_STRING_TOKENS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1298:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:1378:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:2028:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:2036:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). entnum = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:2039:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). enemynum = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:2042:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:2118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:2135:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_func_decs.h:525:69: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). extern void trap_AdjustAreaPortalState ( gentity_t * ent , qboolean open ) ; data/iortcw-1.51.c+dfsg1/SP/code/game/g_func_decs.h:1201:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern void BG_ParseConditionBits ( char * * text_pp , animStringItem_t * stringTable , int condIndex , int result [ 2 ] ) ; data/iortcw-1.51.c+dfsg1/SP/code/game/g_items.c:1133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_ITEMS + 1]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:644:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:645:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteDisplayString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:653:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamVoteString[2][MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:662:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spawnVars[MAX_SPAWN_VARS][2]; // key / value pairs data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:664:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnVarChars[MAX_SPAWN_VARS_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nextMap[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:1024:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char characterfile[MAX_FILEPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_local.h:1189:62: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void trap_AdjustAreaPortalState( gentity_t *ent, qboolean open ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:941:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1032:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1033:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1225:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1269:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[10]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1385:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1396:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1858:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nextmap[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1859:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d1[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1928:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_mem.c:41:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[POOLSIZE]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:1059:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:2429:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_mover.c:4378:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->damage = atoi( damage ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_mover.c:4435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:3238:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->s.frame = atoi( startonframe ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_props.c:3250:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->props_frame_state = atoi( loop ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:67:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char musicString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:415:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char funcStr[512]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:517:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out + outcount, &count, SAVE_ENCODE_COUNT_BYTES ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:525:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out + outcount, raw + oldrawcount, count ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:547:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &count, in + incount, SAVE_ENCODE_COUNT_BYTES ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:556:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out + outcount, in + incount, count ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:645:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( (byte *)&temp ) + ifield->ofs, ( (byte *)client ) + ifield->ofs, ifield->len ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:649:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( client, &temp, size ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:810:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( (byte *)&temp ) + ifield->ofs, ( (byte *)ent ) + ifield->ofs, ifield->len ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:823:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ent, &temp, size ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:968:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( (byte *)&temp ) + ifield->ofs, ( (byte *)cs ) + ifield->ofs, ifield->len ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:972:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cs, &temp, size ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:981:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &cs->bs->cur_ps, &g_entities[cs->entityNum].client->ps, sizeof( playerState_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1048:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *monthStr[12] = data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1071:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char infoString[SAVE_INFOSTRING_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1091:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1092:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapstr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1093:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leveltime[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1094:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char healthstr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1373:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapstr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1786:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1849:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapstr[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:185:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int1 = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:187:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int2 = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:189:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). eInt = atoi( event->params ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:246:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:299:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char params[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:480:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ent->scriptEvents, g_temp_events, sizeof( g_script_event_t ) * numEventItems ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:495:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &scriptStatusBackup, &ent->scriptStatus, sizeof( g_script_status_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:506:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &ent->scriptStatus, &scriptStatusBackup, sizeof( g_script_status_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:263:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). duration = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, name[MAX_QPATH], trigger[MAX_QPATH], *token; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:329:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sound[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:370:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeupTime = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:414:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadeoutTime = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:444:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fadetime = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:459:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, tokens[2][MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:508:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). startframe = atoi( tokens[0] ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:509:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). endframe = atoi( tokens[1] ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:534:57: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). endtime = ent->scriptStatus.scriptStackChangeTime + atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:545:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). rate = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:638:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *pString, *token, lastToken[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:648:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bufferIndex = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:665:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] += atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:670:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] < atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:678:46: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] > atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:686:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] != atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:694:47: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] == atoi( token ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:702:49: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] |= ( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:707:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] &= ~( 1 << atoi( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:712:53: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ent->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:720:56: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !( ent->scriptAccumBuffer[bufferIndex] & ( 1 << atoi( token ) ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:728:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:733:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->scriptAccumBuffer[bufferIndex] = rand() % atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:756:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:761:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mof = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:811:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). lvl = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:885:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). angles[i] = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:895:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). duration = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1204:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1227:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1237:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1278:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1311:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1321:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1356:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1366:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). status = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1515:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->health = atoi( params ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_session.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_session.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_session.c:190:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gt = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:71:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *out = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:793:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *( int * )( b + f->ofs ) = atoi( value ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:890:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, string, l + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:908:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:909:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:110:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). b[i] = atoi( num ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iplist_final[MAX_CVAR_VALUE_STRING] = {0}; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[64] = {0}; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:239:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:398:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:465:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_syscalls.c:188:59: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void trap_AdjustAreaPortalState( gentity_t *ent, qboolean open ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_syscalls.c:189:44: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). syscall( G_ADJUST_AREA_PORTAL_STATE, ent, open ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:1103:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->start_size = atoi( rampup ) * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/g_target.c:1109:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). self->end_size = atoi( rampdown ) * 1000; data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:759:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:760:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1400]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:932:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char numspawntargets[128]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:935:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_tramcar.c:688:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newShader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:69:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buff[MAX_STRING_CHARS * 4]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[( MAX_QPATH * 2 ) + 5]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:337:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][32]; data/iortcw-1.51.c+dfsg1/SP/code/game/g_utils.c:350:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][64]; data/iortcw-1.51.c+dfsg1/SP/code/null/null_glimp.c:57:32: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) { data/iortcw-1.51.c+dfsg1/SP/code/null/null_glimp.c:57:56: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) { data/iortcw-1.51.c+dfsg1/SP/code/null/null_glimp.c:57:82: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) { data/iortcw-1.51.c+dfsg1/SP/code/null/null_main.c:59:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen( ospath, mode ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_local.h:95:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_public.h:70:70: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void CM_AdjustAreaPortalState( int area1, int area2, qboolean open ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_test.c:398:66: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void CM_AdjustAreaPortalState( int area1, int area2, qboolean open ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cm_test.c:407:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ( open ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:61:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cmd_wait = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:105:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &cmd_text.data[cmd_text.cmdsize], text, l ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:134:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( cmd_text.data, text, len - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAX_CMD_LINE]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:233:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( line, text, i ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:353:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *cmd_argv[MAX_STRING_TOKENS]; // points into cmd_tokenized data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:354:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_tokenized[BIG_INFO_STRING + MAX_STRING_TOKENS]; // will have 0 bytes inserted data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:355:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_cmd[BIG_INFO_STRING]; // the original command we received (no token processing) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:401:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_args[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:423:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cmd_args[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:56:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *com_argv[MAX_NUM_ARGVS + 1]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:139:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_errorMessage[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:259:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:453:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *com_consoleLines[MAX_CONSOLE_LINES]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:578:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:579:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:653:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:747:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_filter[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char new_name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1047:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1078:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2033:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_cdkey[34] = " "; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2035:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cl_cdkey[34] = "123456789"; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2045:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[33]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2046:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuffer[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2075:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[33]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuffer[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fbuffer[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[17]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2497:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2601:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2947:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char shortestMatch[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3002:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[ TRUNCATE_LENGTH ]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:219:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[ MAX_CVAR_VALUE_STRING ]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:449:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). var->integer = atoi( var->string ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:619:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). var->integer = atoi( var->string ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:670:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[32]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:687:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[32]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:919:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:1235:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:1257:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakPathname[MAX_OSPATH]; // c:\quake3\baseq3 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakFilename[MAX_OSPATH]; // c:\quake3\baseq3\pak0.pk3 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:252:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakBasename[MAX_OSPATH]; // pak0 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:253:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakGamename[MAX_OSPATH]; // baseq3 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:265:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_OSPATH]; // c:\quake3 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[MAX_OSPATH]; // c:\quake3\baseq3 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gamedir[MAX_OSPATH]; // baseq3 data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:277:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fs_gamedir[MAX_OSPATH]; // this will be a single file name with no separators data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:331:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *fs_serverPakNames[MAX_SEARCH_PATHS]; // pk3 names data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:337:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *fs_serverReferencedPakNames[MAX_SEARCH_PATHS]; // pk3 names data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:340:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidBase[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:341:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidComBaseGame[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:342:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidFsBaseGame[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:343:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastValidGame[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:541:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ospath[2][MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:567:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1231:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f1 = fopen( s1, "rb" ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1236:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f2 = fopen( s2, "rb" ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1330:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). protocol = atoi(ext_test + ARRAY_LEN(DEMOEXT)); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1688:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dllName[MAX_OSPATH], qvmName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1903:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename_inzip[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2478:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int FS_AddFileToList( char *name, char *list[MAX_FOUND_FILES], int nfiles ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2478:42: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static int FS_AddFileToList( char *name, char *list[MAX_FOUND_FILES], int nfiles ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2506:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list[MAX_FOUND_FILES]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zpath[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2766:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char descPath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2803:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3212:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curpath[MAX_OSPATH + 1], *pakfile; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *sorted[MAX_PAKFILES]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3261:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sorted[i],"zz",2 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3275:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sorted[i],"sp",2 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3441:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[MAX_ZPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3820:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorText[MAX_STRING_CHARS] = ""; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3821:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char missingPaks[MAX_STRING_CHARS] = ""; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3964:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorText[MAX_STRING_CHARS] = ""; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3996:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4022:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4052:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4078:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4109:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4143:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4210:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fs_serverPaks[i] = atoi( Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4257:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fs_serverReferencedPaks[i] = atoi( Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[ MAX_STRING_CHARS ]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/json.h:300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cValue[256]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/json.h:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cValue[256]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/json.h:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cValue[256]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:23:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char in[64]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:187:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, len); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:190:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, buf, t); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:199:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, 64); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:208:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ctx->in, buf, len); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:255:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(digest, ctx->buf, 16); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:262:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char final[33] = {""}; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/md5.c:263:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[16] = {""}; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:347:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:450:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:480:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:510:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:68:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *netsrcString[2] = { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:375:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( chan->fragmentBuffer + chan->fragmentLength, data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:397:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( msg->data + 4, chan->fragmentBuffer, chan->fragmentLength ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:459:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( net_message->data, loop->msgs[i].data, loop->msgs[i].datalen ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:477:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( loop->msgs[i].data, data, length ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:578:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MSGLEN]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:633:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char base[MAX_STRING_CHARS], *search; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:684:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). a->port = BigShort((short) atoi(port)); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:137:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname[IF_NAMESIZE]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:319:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sadr, search->ai_addr, search->ai_addrlen); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:458:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:478:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:636:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char socksBuf[4096]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:672:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &socksBuf[10], data, length ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addrbuf[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1072:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[64]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1160:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &buf[2], net_socksUsername->string, ulen ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1164:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &buf[3 + ulen], net_socksPassword->string, plen ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1264:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&localIP[numIP].addr, addr, addrlen); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1265:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&localIP[numIP].netmask, netmask, addrlen); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1296:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[256]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:352:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:353:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_parsename[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:420:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:436:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1190:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char temp_buffer[MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1191:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_VA_STRING]; // in case va is called by nested functions data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1210:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, temp_buffer, len + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1309:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1310:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value[2][BIG_INFO_VALUE]; // use two buffers so compares data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1410:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[MAX_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1411:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1468:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1548:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1588:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:397:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Com_Memcpy memcpy data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:860:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:1099:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:1279:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringData[MAX_GAMESTATE_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:1703:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[32]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.h:1709:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:799:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qcommon.h:820:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cl_cdkey[34]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:207:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:357:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:362:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Comp[24]; // MC_COMP_BYTES is in MatComp.h, but don't want to couple data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:380:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:387:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:444:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:445:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:499:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // name of tag data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:507:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // name of bone data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:518:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:637:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/qfiles.h:682:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:97:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:230:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char symbols[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:550:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:590:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:1002:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("syscalls.log", "w" ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:108:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char vm_opInfo[256] = data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:179:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *opnames[256] = { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:257:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open("code.bin", O_TRUNC|O_WRONLY|O_CREAT, 0644); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:263:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vm->codeBase+vm->codeLength, &isn, 4); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:668:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[4]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:677:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(arg.b, &code[pc], 4); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_armv7l.c:1184:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( argPointer, args, 4 * MAX_VMMAIN_ARGS ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_interpreted.c:26:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *opnames[256] = { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_interpreted.c:139:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&word, addr, 4); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_local.h:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char symName[1]; // variable sized data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_local.h:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc.c:196:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char vm_opInfo[256] = data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc.c:486:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &(di_now->code[0]), is, iBytes ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc.c:1839:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( codeNow, &(di_now->code[0]), di_now->length * sizeof( ppc_instruction_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc.c:2034:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[4]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc.c:2104:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( argPointer, args, 4 * MAX_VMMAIN_ARGS ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_powerpc_asm.c:64:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char operands[8]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:60:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char args[4]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:412:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char vm_opInfo[256] = data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:482:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *opnames[256] = { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:696:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&dp->code[0], fp->insn_buf, insns_size); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:837:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(currentVM->dataBase+dest, currentVM->dataBase+src, count); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:1466:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(code_now, &dp->code[0], dp->length * sizeof(unsigned int)); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:1603:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char b[4]; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm_sparc.c:1655:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( argPointer, args, 4 * MAX_VMMAIN_ARGS ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_animation.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char validBones[MDS_MAX_BONES]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_animation.c:60:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newBones[ MDS_MAX_BONES ]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_animation.c:1028:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bonePtr->matrix, tmpAxis, sizeof( tmpAxis ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_animation.c:1040:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( oldBones, bones, sizeof( bones[0] ) * header->numBones ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_backend.c:513:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *zombieFxFleshHitSurfaceNames[2] = {"u_body","l_legs"}; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_backend.c:2221:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:173:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void ColorToRGBM(const vec3_t color, unsigned char rgbm[4]) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:288:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:325:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:385:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(color, &buf_p[j*12], 12); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:592:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, buf + 8, len - 8 ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:1958:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2211:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out, in, count * sizeof( *out ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2545:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( w->lightGridData, ( void * )( fileBase + l->fileofs ), l->filelen ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2556:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2623:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2624:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2725:28: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_ParseSpawnVars( char *spawnVarChars, int maxSpawnVarChars, int *numSpawnVars, char *spawnVars[MAX_SPAWN_VARS][2] ) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2725:90: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_ParseSpawnVars( char *spawnVarChars, int maxSpawnVarChars, int *numSpawnVars, char *spawnVars[MAX_SPAWN_VARS][2] ) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2727:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2728:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2798:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2845:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cubemapJson, *keyValueJson, *indexes[3]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2870:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnVarChars[2048]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2872:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spawnVars[MAX_SPAWN_VARS][2]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2899:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2977:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:3225:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:3240:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fileName, "primarylg%d.tga", i); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_curve.c:386:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_curve.c:389:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_curve.c:399:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_curve.c:402:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_extensions.c:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[256]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_fbo.h:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_font.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:170:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char msgPart[1024]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:491:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char uniformName[1000]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:590:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vpCode[32000]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:591:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fpCode[32000]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:926:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extradefines[1024]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:41:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char s_gammatable[256]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:2366:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:2383:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ddsName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:2508:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char normalName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3038:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3235:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char surfName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3382:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( skin->surfaces, parseSurfaces, skin->numSurfaces * sizeof( skinSurface_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3559:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_CropImage( char *name, byte **pic, int border, int *width, int *height, int lastBox[2] ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3899:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], outfilename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3930:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3942:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3952:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3994:72: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3994:98: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3994:124: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_bmp.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[2]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_bmp.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[256][4]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_jpg.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_jpg.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_pcx.c:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[48]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_pcx.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[54]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_png.c:693:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CompressedDataPtr, OrigCompressedData, Length); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_index, &buf_p[3], 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_length, &buf_p[5], 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.x_origin, &buf_p[8], 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.y_origin, &buf_p[10], 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.width, &buf_p[12], 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:89:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.height, &buf_p[14], 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:295:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (flip, src, columns*4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:296:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (src, dst, columns*4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image_tga.c:297:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dst, flip, columns*4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:380:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:391:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_ENUM" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:394:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_VALUE" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:397:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_OPERATION" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:400:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_OVERFLOW" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:403:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_UNDERFLOW" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:406:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_OUT_OF_MEMORY" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:676:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fileName[MAX_OSPATH]; // bad things if two screenshots per frame? data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:753:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:824:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:877:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:1131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imgName[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:488:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:804:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:839:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:880:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:888:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_QPATH]; // md3_lower, md3_lbelt, md3_rbelt, etc. data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:889:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; // lower.md3, belt1.md3, etc. data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:893:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:1118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:1250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // ie: maps/tim_dm2.bsp data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:1251:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char baseName[MAX_QPATH]; // ie: tim_dm2 data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:1317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:1336:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:1382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:2256:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:2257:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char green[256], data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_local.h:2258:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char blue[256] ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:118:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_CURRENT], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:121:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_TARGET], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:145:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_CURRENT], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:150:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:153:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_TARGET], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:748:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:753:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_main.c:791:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_marks.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( outPoints, inPoints, numInPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], namebuf[MAX_QPATH+20]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:337:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:993:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1001:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1005:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1009:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1020:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1024:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1028:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1032:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1473:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1481:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1485:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1489:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1500:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->xyz, sizeof(vec3_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1504:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &st->st, sizeof(vec2_t)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1508:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->normal, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1512:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &v->tangent, sizeof(int16_t) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1947:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mds, buffer, LittleLong( pinmodel->ofsEnd ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:2280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tagName[MAX_QPATH]; //, *ch; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:980:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &iqmData->positions[vtx*3], sizeof(float) * 3); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:984:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &iqmData->texcoords[vtx*2], sizeof(float) * 2); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:998:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &blendIndexes[vtx*4], sizeof(byte) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:1003:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &blendWeights.f[vtx*4], sizeof(float) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:1006:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &blendWeights.b[vtx*4], sizeof(byte) * 4); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_scene.c:156:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, verts, numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_scene.c:232:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, &verts[numVerts * j], numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:1274:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024] = ""; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:1500:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *suf[6] = {"rt", "bk", "lf", "ft", "up", "dn"}; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:1501:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:1981:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fogString[64]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:2347:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char normalName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:2393:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char specularName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:2889:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( newShader->stages[i]->bundle[b].texMods, stages[i].bundle[b].texMods, size ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3356:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3841:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buffers[MAX_SHADER_FILES] = {NULL}; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3846:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3865:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3873:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ext, ".mtr"); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_subs.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_subs.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:273:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].xyz, sizeof(verts[i].xyz)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:277:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].normal, sizeof(verts[i].normal)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:281:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].tangent, sizeof(verts[i].tangent)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:285:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].st, sizeof(verts[i].st)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:289:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].lightmap, sizeof(verts[i].lightmap)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:293:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].color, sizeof(verts[i].color)); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:297:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(data + dataOfs, &verts[i].lightdir, sizeof(verts[i].lightdir)); data/iortcw-1.51.c+dfsg1/SP/code/renderer/iqm.h:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char magic[16]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_animation.c:59:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char validBones[MDS_MAX_BONES]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_animation.c:60:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char newBones[ MDS_MAX_BONES ]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_animation.c:1023:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( bonePtr->matrix, tmpAxis, sizeof( tmpAxis ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_animation.c:1035:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( oldBones, bones, sizeof( bones[0] ) * header->numBones ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_backend.c:582:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *zombieFxFleshHitSurfaceNames[2] = {"u_body","l_legs"}; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:266:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, buf + 8, len - 8 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:1705:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( out, in, count * sizeof( *out ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:2038:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( w->lightGridData, ( void * )( fileBase + l->fileofs ), l->filelen ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:2054:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:2055:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_curve.c:311:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_curve.c:314:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_curve.c:320:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->widthLodError, errorTable[0], width * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_curve.c:323:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( grid->heightLodError, errorTable[1], height * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_font.c:359:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:39:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char s_gammatable[256]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:472:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( in, temp, outWidth * outHeight * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1071:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( scaledBuffer, data, width * height * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1087:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( scaledBuffer, data, width * height * 4 ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1761:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1958:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char surfName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2105:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( skin->surfaces, parseSurfaces, skin->numSurfaces * sizeof( skinSurface_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2282:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. qboolean R_CropImage( char *name, byte **pic, int border, int *width, int *height, int lastBox[2] ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2620:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], outfilename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2651:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2663:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2673:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pic, temppic, sizeof( unsigned int ) * newWidth * newHeight ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2715:72: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2715:98: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:2715:124: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). R_CropAndNumberImagesInDirectory( ri.Cmd_Argv( 1 ), ri.Cmd_Argv( 2 ), atoi( ri.Cmd_Argv( 3 ) ), atoi( ri.Cmd_Argv( 4 ) ), atoi( ri.Cmd_Argv( 5 ) ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_bmp.c:27:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[2]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_bmp.c:42:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[256][4]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_jpg.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_jpg.c:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JMSG_LENGTH_MAX]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_pcx.c:41:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[48]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_pcx.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filler[54]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_png.c:693:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(CompressedDataPtr, OrigCompressedData, Length); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:83:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_index, &buf_p[3], 2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:84:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.colormap_length, &buf_p[5], 2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:86:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.x_origin, &buf_p[8], 2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:87:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.y_origin, &buf_p[10], 2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:88:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.width, &buf_p[12], 2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:89:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&targa_header.height, &buf_p[14], 2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:295:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (flip, src, columns*4); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:296:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (src, dst, columns*4); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image_tga.c:297:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dst, flip, columns*4); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:305:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[64]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:316:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_ENUM" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:319:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_VALUE" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:322:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_INVALID_OPERATION" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:325:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_OVERFLOW" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:328:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_STACK_UNDERFLOW" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:331:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s, "GL_OUT_OF_MEMORY" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:613:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char fileName[MAX_OSPATH]; // bad things if two screenshots per frame? data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:690:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:761:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:814:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char checkname[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:1035:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imgName[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:524:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:532:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[MAX_QPATH]; // md3_lower, md3_lbelt, md3_rbelt, etc. data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; // lower.md3, belt1.md3, etc. data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:537:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // game path, including extension data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:746:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:810:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // ie: maps/tim_dm2.bsp data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:811:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char baseName[MAX_QPATH]; // ie: tim_dm2 data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:865:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:1471:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:1472:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char green[256], data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_local.h:1473:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char blue[256] ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:236:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_CURRENT], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:239:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_TARGET], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:263:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[FOG_CURRENT], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:268:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_LAST], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:271:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_TARGET], &glfogsettings[glfogNum], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:639:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:644:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_main.c:682:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &glfogsettings[FOG_CURRENT], &glfogsettings[FOG_TARGET], sizeof( glfog_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_marks.c:95:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( outPoints, inPoints, numInPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], namebuf[MAX_QPATH+20]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:356:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:358:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altName[ MAX_QPATH ]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:773:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( md3Frame_t * )( (byte *)mdc + mdc->ofsFrames ), ( md3Frame_t * )( (byte *)md3 + md3->ofsFrames ), mdcHeader.numFrames * sizeof( md3Frame_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:776:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( ( mdcTagName_t * )( (byte *)mdc + mdc->ofsTagNames ) + j, ( ( md3Tag_t * )( (byte *)md3 + md3->ofsTags ) + j )->name, sizeof( mdcTagName_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:821:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsTriangles, (byte *)surf + surf->ofsTriangles, cSurf->numTriangles * sizeof( md3Triangle_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:823:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsShaders, (byte *)surf + surf->ofsShaders, cSurf->numShaders * sizeof( md3Shader_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:825:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsSt, (byte *)surf + surf->ofsSt, cSurf->numVerts * sizeof( md3St_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:833:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (byte *)cSurf + cSurf->ofsXyzNormals + ( sizeof( md3XyzNormal_t ) * cSurf->numVerts * i ), data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:902:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mod->mdc[lod], buffer, LittleLong( pinmodel->ofsEnd ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:1115:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mod->md3[lod], buffer, LittleLong( pinmodel->ofsEnd ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:1653:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mds, buffer, LittleLong( pinmodel->ofsEnd ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:2067:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tagName[MAX_QPATH]; //, *ch; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model_iqm.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char meshName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_scene.c:152:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, verts, numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_scene.c:228:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->verts, &verts[numVerts * j], numVerts * sizeof( *verts ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade.c:355:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx, input->xyz[i], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade.c:356:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+1, temp, sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade.c:739:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tess.svars.colors, tess.vertexColors, tess.numVertexes * sizeof( tess.vertexColors[0] ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade.c:748:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( tess.svars.colors, tess.vertexColors, tess.numVertexes * sizeof( tess.vertexColors[0] ) ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade_calc.c:669:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char invModulate[4]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:91:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:968:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024] = ""; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:1194:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *suf[6] = {"rt", "bk", "lf", "ft", "up", "dn"}; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:1195:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pathname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:1639:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fogString[64]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:2152:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( newShader->stages[i]->bundle[b].texMods, stages[i].bundle[b].texMods, size ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:2545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:2604:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strippedName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:3111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buffers[MAX_SHADER_FILES] = {NULL}; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:3116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:3135:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:404:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:405:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:407:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t+1][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:408:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t+1][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:471:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:472:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:474:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tex+idx*2, s_skyTexCoords[t+1][s], sizeof(GLfloat)*2); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_sky.c:475:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+idx*3, s_skyPoints[t+1][s], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_subs.c:29:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_subs.c:41:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_surface.c:364:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+i*6, start_points[ i % NUM_BEAM_SEGS], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_surface.c:365:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(vtx+i*6+3, end_points[ i % NUM_BEAM_SEGS], sizeof(GLfloat)*3); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_types.h:240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_types.h:292:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char renderer_string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_types.h:293:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_types.h:294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version_string[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_types.h:295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extensions_string[4 * MAX_STRING_CHARS]; // this is actually too short for many current cards/drivers // (SA) doubled from 2x to 4x MAX_STRING_CHARS data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_gamma.c:39:31: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_gamma.c:39:55: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_gamma.c:39:81: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. void GLimp_SetGamma( unsigned char red[256], unsigned char green[256], unsigned char blue[256] ) data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ MAX_STRING_CHARS ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:348:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char profile[6]; // ES, ES-CM, or ES-CL data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_icon.h:7:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char pixel_data[128 * 128 * 4]; data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_input.c:454:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16384] = ""; data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_snd.c:86:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stream, dma.buffer + pos, len1); data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_snd.c:91:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(stream+len1, dma.buffer, len2); data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *configstrings[MAX_CONFIGSTRINGS]; data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clientCommandString[MAX_STRING_CHARS]; // valid command string for SV_Netchan_Encode data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:154:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; // name, etc data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:169:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastClientCommandString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; // extracted from userinfo, high bits masked data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_QPATH]; // if not empty string, we are downloading data/iortcw-1.51.c+dfsg1/SP/code/server/server.h:181:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char *downloadBlocks[MAX_DOWNLOAD_WINDOW]; // the buffers for the download blocks data/iortcw-1.51.c+dfsg1/SP/code/server/sv_bot.c:177:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_bot.c:379:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->points, points, numPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_bot.c:396:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( poly->points, points, numPoints * sizeof( vec3_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanName[64]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:72:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int plid = atoi(s); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:136:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:163:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char smapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:166:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:182:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char savemap[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:347:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:361:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:486:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:844:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:896:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). serverBans[index].subnet = atoi(maskpos); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:930:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filepath[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:939:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writebuf[128]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1002:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *mask = atoi(suffix); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1034:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addy2[NET_ADDRSTRMAXLEN]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1089:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mask = atoi(Cmd_Argv(2)); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1227:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). todel = atoi(Cmd_Argv(1)); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1445:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1457:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( text, "console: " ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1478:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1497:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (text, "console_tell: "); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:114:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clientChallenge = atoi(Cmd_Argv(1)); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:237:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:334:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:363:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). version = atoi(Info_ValueForKey(userinfo, "protocol")); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:380:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). qport = atoi( Info_ValueForKey( userinfo, "qport" ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:381:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). challenge = atoi( Info_ValueForKey( userinfo, "challenge" ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:891:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int block = atoi( Cmd_Argv( 1 ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:940:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorMessage[1024]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:941:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pakbuf[MAX_QPATH], *pakptr; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1252:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !pArg || *pArg == '@' || atoi( pArg ) != nChkSum1 ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1258:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !pArg || *pArg == '@' || atoi( pArg ) != nChkSum2 ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1270:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nClientChkSum[i] = atoi( Cmd_Argv( nCurArg++ ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1305:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). nServerChkSum[i] = atoi( Cmd_Argv( i ) ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1386:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( val ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1399:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( val ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1409:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( val ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1479:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int id = atoi(idstr); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1831:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(packet->data, encoded, packetsize); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:131:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ent->s.modelindex = atoi( name + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:209:62: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void SV_AdjustAreaPortalState( sharedEntity_t *ent, qboolean open ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:216:61: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). CM_AdjustAreaPortalState( svEnt->areanum, svEnt->areanum2, open ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:847:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( VMA( 1 ), VMA( 2 ), args[3] ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_init.c:57:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_init.c:690:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systemInfo[16384]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:96:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char player[1024]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:558:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char status[MAX_MSGLEN]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:564:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infostring[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:627:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infostring[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:739:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char remaining[1024]; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:741:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sv_outputbuf[SV_OUTPUTBUF_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/splines/math_matrix.h:94:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mat, src, sizeof( *src ) ); data/iortcw-1.51.c+dfsg1/SP/code/splines/math_vector.cpp:142:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[ 8 ][ 36 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/math_vector.cpp:149:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( s, "%.2f %.2f %.2f", x, y, z ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:52:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parseFile[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[32000]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[32000]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:347:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( pi->token, *punc, l ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:463:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char line[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:358:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:359:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_parsename[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:419:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:435:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1159:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char temp_buffer[MAX_VA_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1160:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[MAX_VA_STRING]; // in case va is called by nested functions data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1179:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( buf, temp_buffer, len + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1279:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value[2][BIG_INFO_VALUE]; // use two buffers so compares data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1379:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[MAX_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1380:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1517:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1557:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[BIG_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:381:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Com_Memcpy memcpy data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:846:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:1132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_CVAR_VALUE_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:1312:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringData[MAX_GAMESTATE_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:1736:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[32]; data/iortcw-1.51.c+dfsg1/SP/code/splines/q_splineshared.h:1742:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:586:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). loadCamera( atoi( param1 ), va( (char *)"cameras/%s.camera", param2 ) ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:960:51: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = static_cast<idCameraEvent::eventType>( atoi( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:964:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:1076:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:1095:10: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atol( token ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:1098:55: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = static_cast<idCameraPosition::positionType>( atoi( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:1101:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long t = atol( token ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:1103:12: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). long d = atol( token ); data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:1115:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:257:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:261:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%f", b ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:272:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:276:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%d", b ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:287:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:291:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%u", b ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:303:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%f", a ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:315:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%d", a ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:325:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 20 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:327:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%u", a ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[0x10000]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 32 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:252:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%.3f", num ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 32 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:266:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%d", num ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 32 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:280:2: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( text, "%u", num ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:502:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 2 ]; data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:530:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[ 2 ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/con_log.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char consoleLog[ MAX_LOG ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:336:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char text[MAX_EDIT_LINE]; data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c:38:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char qconsole_history[ QCONSOLE_HISTORY ][ MAX_EDIT_LINE ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char qconsole_line[ MAX_EDIT_LINE ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c:492:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[ MAXPRINTMSG ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:50:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char binaryPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char installPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:218:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if( ( f = fopen( pidFile, "r" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:220:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pidBuffer[ 64 ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:228:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pid = atoi( pidBuffer ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:240:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if( ( f = fopen( pidFile, "w" ) ) != NULL ) data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:259:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[1024]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:260:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modName[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:356:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[ MAXPRINTMSG ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:455:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:526:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libPath[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:692:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char commandLine[ MAX_STRING_CHARS ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char homePath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char steamPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:55:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gogPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:200:7: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen( "/dev/urandom", "r" ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:277:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen( ospath, mode ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:315:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fifo = fopen( ospath, "w+" ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:332:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cwd[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:360:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH], newsubdirs[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:361:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:420:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:423:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list[MAX_FOUND_FILES]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:580:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ 1024 ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:612:6: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = open( ospath, O_CREAT | O_TRUNC | O_WRONLY, 0640 ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:631:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char execBuffer[ 1024 ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:633:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *execArgv[ 16 ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1012:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char exit_cmdline[MAX_CMD] = ""; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1087:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[20]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1088:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:1089:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmdline[MAX_CMD]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char homePath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:51:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char steamPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:54:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gogPath[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:101:2: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szPath[MAX_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:280:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char s_userName[1024]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:284:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_userName, "player" ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:288:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_userName, "player" ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:315:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char base[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:345:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char dir[ MAX_OSPATH ] = { 0 }; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:373:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen( ospath, mode ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:409:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char cwd[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:434:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH], newsubdirs[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:435:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:514:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[MAX_OSPATH]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:517:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *list[MAX_FOUND_FILES]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:687:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[ 1024 ]; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:895:2: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szPathOrig[MAX_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:48:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char archivedir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:60:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ex_argv[MAX_EX_ARGC]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filebase[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text2[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:180:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[4096]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:217:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qdir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:218:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gamedir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:219:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writedir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:300:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:314:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:327:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char archivename[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:644:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:651:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(fn, mode); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:724:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)buffer)[length] = 0; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:784:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)buffer)[length] = 0; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[128]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:886:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dest, path, src-path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:967:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atol (str); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:1089:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:1109:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dir, path, ofs - path ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h:49:28: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #pragma intrinsic( memset, memcpy ) data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h:81:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char qdir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h:82:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char gamedir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h:83:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char writedir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h:120:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char com_token[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.h:134:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char archivedir[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:31:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outputFilename[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:190:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *asmFiles[MAX_ASM_FILES]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:191:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *asmFileNames[MAX_ASM_FILES]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:208:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:210:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:595:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:669:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( lineBuffer, data, (p - data) ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:733:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym[MAX_LINE_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:743:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sym, token, i ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:766:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sym, token+i+1, j-i-1 ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:923:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1067:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imageName[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1322:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( imageName, ".map" ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1347:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imageName[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1356:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( imageName, ".qvm" ); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1427:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_OS_PATH]; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:1552:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( outputFilename, "q3asm" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:47:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAXPRINTMSG]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:125:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:134:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gameList[4096]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:275:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:277:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:286:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:302:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.accuracy = atoi( UI_Argv( 3 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:303:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.impressives = atoi( UI_Argv( 4 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:304:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.excellents = atoi( UI_Argv( 5 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:305:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.defends = atoi( UI_Argv( 6 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:306:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.assists = atoi( UI_Argv( 7 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:307:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.gauntlets = atoi( UI_Argv( 8 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:308:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.baseScore = atoi( UI_Argv( 9 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:309:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.perfects = atoi( UI_Argv( 10 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:310:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.redScore = atoi( UI_Argv( 11 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:311:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.blueScore = atoi( UI_Argv( 12 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:312:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi( UI_Argv( 13 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:313:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.captures = atoi( UI_Argv( 14 ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:404:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader1[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:405:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader2[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:406:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader3[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_botInfos[MAX_BOTS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:47:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_arenaInfos[MAX_ARENAS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:62:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:95:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( token, "<NULL>" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ARENAS_TEXT]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:145:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:165:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( filename, "scripts/" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:239:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BOTS_TEXT]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:289:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( filename, "scripts/" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:706:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *teamMembers[TEAM_MEMBERS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:733:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *maps[MAPS_PER_TIER]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:744:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:775:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char motd[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:790:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:791:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:803:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:804:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lines[MAX_SERVERSTATUS_LINES][4]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:805:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SERVERSTATUS_TEXT]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pings[MAX_CLIENTS * 3]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:848:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerNames[MAX_CLIENTS][MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:849:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamNames[MAX_CLIENTS][MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:865:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *demoList[MAX_DEMOS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:869:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *movieList[MAX_MOVIES]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:885:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverStatusAddress[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:891:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char findPlayerName[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:892:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foundPlayerServerAddresses[MAX_FOUNDPLAYER_SERVERS][MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:893:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foundPlayerServerNames[MAX_FOUNDPLAYER_SERVERS][MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:903:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char q3HeadNames[MAX_PLAYERMODELS][64]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_local.h:912:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnPoints[MAX_SPAWNPOINTS][MAX_SPAWNDESC]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:412:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:493:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor[0], &color[0], sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:747:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUFILE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1084:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_BUFFER]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1086:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1126:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastName[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char levelname[64]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1685:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hunkBuf[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1696:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). expectedHunk = atoi( hunkBuf ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1811:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1812:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[256]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1813:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[256]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1819:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( model, "multi" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2069:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2070:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headmodel[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2404:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2409:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.teamLeader = atoi( Info_ValueForKey( info, "tl" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2410:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team = atoi( Info_ValueForKey( info, "t" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2412:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). count = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2423:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team2 = atoi( Info_ValueForKey( info, "t" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2469:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[4096]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2552:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *lines[64]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:2615:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[140]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3205:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char masterstr[2], cvarname[sizeof("sv_master1")]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3605:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3690:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *monthStr[12] = data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3704:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[SAVE_INFOSTRING_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3705:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3794:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sglist[4096]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3866:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char movielist[4096]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3898:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demolist[NAMEBUFSIZE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3899:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoExt[32]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3974:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4241:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cs[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4255:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.spawnCount = atoi( s ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4372:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4601:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4687:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[17]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4769:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4949:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4950:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4973:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4982:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4983:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_ADDRESSLENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5082:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). selectType = atoi( param ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5083:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). itemIndex = atoi( param2 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5295:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( uiInfo.serverStatus.motd, "Welcome to Team Arena!" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5345:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clients = atoi( Info_ValueForKey( info, "clients" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5357:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maxClients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5613:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH + 2]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5614:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5873:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUDEFFILE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5921:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5922:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hostname[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5923:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char clientBuff[32]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5947:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ping = atoi( Info_ValueForKey( info, "ping" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5957:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int nettype = atoi(Info_ValueForKey(info, "nettype")); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5973:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi( Info_ValueForKey( info, "gametype" ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6087:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6673:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6674:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filelist[2048]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6675:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinname[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6986:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7175:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char lastLoadingText[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7218:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dlSizeBuf[64], totalSizeBuf[64], xferRateBuf[64], dlTimeBuf[64]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7293:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7294:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[256]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7350:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_INFO_VALUE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:851:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( legs.torsoAxis, torso.axis, sizeof( torso.axis ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:959:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1086:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animModelInfo->version = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1138:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1157:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1164:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1184:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].moveSpeed = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1191:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].animBlend = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1242:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skip = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1245:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].firstFrame = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1253:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). headAnims[i].numFrames = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1312:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1313:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_public.h:38:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servername[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_public.h:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateInfoString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_public.h:40:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char messageString[MAX_STRING_CHARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:90:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[MEM_POOL_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:313:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char strPool[STRING_POOL_SIZE]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:417:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:419:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:442:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:566:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *i = atoi( token ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:696:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1388:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char curscript[64]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1513:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &item->window.rectClient, &rectFrom, sizeof( rectDef_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1514:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &item->window.rectEffects, &rectTo, sizeof( rectDef_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1644:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). DC->feederAddItem( t->special, name, atoi( val ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1681:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024], *p; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1717:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024], *p; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:1720:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:2377:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:2403:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:2466:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3287:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[256]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3327:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3333:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( newColor, &parent->disableColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3339:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3415:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3417:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3458:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3459:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infostring[SAVE_INFOSTRING_LENGTH]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3540:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3561:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3589:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3615:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3771:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[256]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3883:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_nameBind1[32]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3884:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_nameBind2[32]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3910:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( g_nameBind1, "???" ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3925:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3965:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &newColor, &item->window.foreColor, sizeof( vec4_t ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:5705:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &item->colorRanges[item->numColors], &color, sizeof( color ) ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:118:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[MAX_SCRIPT_ARGS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:212:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvarList[MAX_MULTI_CVARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:213:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvarStr[MAX_MULTI_CVARS]; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.h:294:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *onKey[255]; // NERVE - SMF - execs commands when a key is pressed data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.c:19:36: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define FOPEN_FUNC(filename, mode) fopen(filename, mode) data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.c:109:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). file = fopen(filename, mode_fopen); data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.h:54:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen64 fopen data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.h:59:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen64 fopen data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/ioapi.h:64:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fopen64 fopen data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/unzip.c:1277:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char szCurrentFileName[UNZ_MAXFILENAMEINZIP+1]; data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/unzip.c:1493:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char source[12]; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:284:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( value, epair->value, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:425:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsize += strlen( token.string ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:432:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsize += strlen( token.string ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:469:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). epair->key = (char *) buftrav; buftrav += ( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:477:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). epair->value = (char *) buftrav; buftrav += ( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_bspq3.c:519:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bspworld.entdatasize = strlen( botimport.BSPEntityData() ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:170:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( *aasworld ).configstrings[i] = (char *) GetMemory( strlen( configstrings[i] ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:367:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strcat( this_mapname, sizeof( this_mapname ) - strlen( this_mapname ) - 1, "_b" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_aas_main.c:369:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strcat( this_mapname, sizeof( this_mapname ) - strlen( this_mapname ) - 1, intstr ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:197:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch->c[i].value.string = (char *) GetMemory( strlen( defaultch->c[i].value.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:289:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch->c[index].value.string = GetMemory( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:528:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). out->c[i].value.string = (char *) GetMemory( strlen( ch1->c[i].value.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_char.c:739:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, ch->c[index].value.string, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:453:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( &message[i], &message[i + 1], strlen( &message[i + 1] ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:477:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( oldptr, ptr, strlen( ptr ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:496:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:496:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:529:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:529:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:585:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( str2 <= str && str < str2 + strlen( replacement ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:591:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:591:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:591:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:591:81: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:593:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy( str, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:596:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = StringContainsWord( str + strlen( replacement ), synonym, qfalse ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:715:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token.string ) <= 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:720:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(token.string) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:885:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str1 + strlen( replacement ), str1 + strlen( synonym->string ), data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:885:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str1 + strlen( replacement ), str1 + strlen( synonym->string ), data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:886:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( str1 + strlen( synonym->string ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:886:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( str1 + strlen( synonym->string ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:888:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy( str1, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:925:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + strlen( token.string ) + 1 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:925:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + strlen( token.string ) + 1 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:933:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + 7 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:937:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf( &ptr[strlen( ptr )], "%cv%ld%c", ESCAPE_CHAR, token.intvalue, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:941:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + 7 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:945:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf( &ptr[strlen( ptr )], "%cr%s%c", ESCAPE_CHAR, token.string, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1035:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(token.string) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1063:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chatmessagestring) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1250:93: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). matchstring = (bot_matchstring_t *) GetClearedHunkMemory( sizeof( bot_matchstring_t ) + strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1253:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( token.string ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1419:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( ms->string ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1442:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strptr = newstrptr + strlen( ms->string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1452:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !mp && ( lastvariable >= 0 || !strlen( strptr ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1455:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match->variables[lastvariable].length = strlen( match->variables[lastvariable].ptr ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1473:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while ( strlen( match->string ) && data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1474:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match->string[strlen( match->string ) - 1] == '\n' ) data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1476:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match->string[strlen( match->string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1504:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1512:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, match->variables[variable].ptr, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1517:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1585:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = GetClearedMemory( sizeof( bot_stringlist_t ) + strlen( temp ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1827:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( namebuffer, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1836:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( namebuffer ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1837:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( namebuffer, "\\" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1846:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key->string = (char *) GetClearedHunkMemory( strlen( namebuffer ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1858:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key->string = (char *) GetClearedHunkMemory( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:1887:92: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chatmessage = (bot_chatmessage_t *) GetClearedHunkMemory( sizeof( bot_chatmessage_t ) + strlen( chatmessagestring ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2035:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chatmessagestring) + 1; data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2231:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( len + strlen( temp ) >= MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2236:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( temp ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2258:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( len + strlen( ptr ) >= MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2263:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( ptr ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2432:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[0].length = strlen( var0 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2436:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[1].length = strlen( var1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2440:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[2].length = strlen( var2 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2444:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[3].length = strlen( var3 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2448:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[4].length = strlen( var4 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2452:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[5].length = strlen( var5 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2456:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[6].length = strlen( var6 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2460:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[7].length = strlen( var7 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2614:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[0].length = strlen( var0 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2618:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[1].length = strlen( var1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2622:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[2].length = strlen( var2 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2626:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[3].length = strlen( var3 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2630:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[4].length = strlen( var4 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2634:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[5].length = strlen( var5 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2638:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[6].length = strlen( var6 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2642:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[7].length = strlen( var7 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2674:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen( cs->chatmessage ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2690:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cs->chatmessage ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2700:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( cs->chatmessage, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2718:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, cs->chatmessage, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2721:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( cs->chatmessage, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_chat.c:2757:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( cs->name, name, sizeof( cs->name ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:644:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( name, itemconfig->iteminfo[li->iteminfo].name, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_goal.c:649:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( name, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_ai_weight.c:366:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). config->weights[config->numweights].name = (char *) GetClearedMemory( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/be_interface.c:264:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( value, varvalue, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c:90:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->name = (char *) GetMemory(strlen(var_name)+1); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c:194:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->string = (char *) GetMemory( strlen( value ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_libvar.c:245:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->string = (char *) GetMemory( strlen( value ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_log.c:69:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !filename || !strlen( filename ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:466:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:469:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string, t->string, MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:469:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat( token->string, t->string, MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:471:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat( token->string, "\"", MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:471:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat( token->string, "\"", MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:489:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t1->string[strlen( t1->string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:678:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). define->name = (char *) GetMemory(strlen(builtin[i].string) + 1); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:723:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->subtype = strlen( token->string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:732:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:733:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string, curtime + 4, 7 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:734:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string + 7, curtime + 20, 4 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:735:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:738:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->subtype = strlen( token->string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:747:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:748:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string, curtime + 11, 8 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:749:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:752:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->subtype = strlen( token->string ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:934:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(ptr, ptr+1, strlen(ptr)); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:1002:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( path ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:1190:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). define->name = (char *) GetMemory(strlen(token.string) + 1); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:1295:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). script = LoadScriptMemory( string, strlen( string ), "*extern" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:1424:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newdefine->name = (char *) GetMemory(strlen(define->name) + 1); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2380:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token.string, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2411:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token.string, "-" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2722:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->string[strlen( token->string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2723:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token->string ) + strlen( newtoken.string + 1 ) + 1 >= MAX_TOKEN ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2723:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token->string ) + strlen( newtoken.string + 1 ) + 1 >= MAX_TOKEN ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2796:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( str, "" ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2817:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str, ""); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_precomp.c:2958:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(source->includepath); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:192:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( p->p ) < strlen( newp->p ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:192:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( p->p ) < strlen( newp->p ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:808:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( p ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:959:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str, ""); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:980:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str, ""); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1140:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(string, string+1, strlen(string)); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1142:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( string[strlen( string ) - 1] == '\"' ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1143:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string[strlen( string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1154:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(string, string+1, strlen(string)); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1156:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( string[strlen( string ) - 1] == '\'' ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1157:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string[strlen( string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1288:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( value ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_script.c:1339:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( basefolder ) ) { data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_struct.c:226:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( (char *) p, token.string, MAX_STRINGFIELD - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/botlib/l_struct.c:367:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:479:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extptr = locfilename + strlen( locfilename ) - 4; data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_consolecmds.c:510:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( buffptr, strlen( buffptr ), f ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:78:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:115:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:166:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:257:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(num); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:309:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( num ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:1354:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( cg.centerPrint ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:1406:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( cg.centerPrint ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2813:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:2817:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s2 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3124:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( cg.oidPrint ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_draw.c:3887:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cg_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_ents.c:184:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringlength = strlen( cent->dl_stylestring ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_event.c:1124:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( s && strlen( s ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_flamethrower.c:1194:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( str, strlen( str ), f ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:669:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( str ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:678:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( cent->dl_stylestring, token, strlen( token ) ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:684:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cent->dl_oldframe = strlen( cent->dl_stylestring ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:693:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( j = 0; j < strlen( cent->dl_stylestring ); j++ ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_main.c:1562:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( parm1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_newdraw.c:1895:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_predict.c:731:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cg_missionStats.string ) > 1 || cg_norender.integer ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_scoreboard.c:346:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !buf || !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:324:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( originalShader, o, n - o ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:329:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( newShader, n, t - n ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:337:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( timeOffset, t, o - t ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1061:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( headModelVoiceChat[i].headmodel ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1077:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( voiceChatLists[i].name ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1081:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( headModelVoiceChat[j].headmodel ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1100:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( headModelVoiceChat[j].headmodel ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1373:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( temp, buf + prev, i - prev ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1376:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token, buf + prev, i - prev ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1393:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( temp, buf + prev, i - prev ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_servercmds.c:1396:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token, buf + prev, i - prev ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_spawn.c:142:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ); data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c:1331:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !( cstr = (char *)CG_ConfigString( CS_SKYBOXORG ) ) || !strlen( cstr ) ) { data/iortcw-1.51.c+dfsg1/MP/code/cgame/cg_view.c:1338:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cg_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_avi.c:96:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_Memcpy( &buffer[ bufIndex ], s, strlen( s ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_avi.c:97:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufIndex += strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:261:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( dup ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:338:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:338:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:347:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) + 1 >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:347:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) + 1 >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:351:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( bigConfigString, "\"" ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:757:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( VMA(1), VMA(2), args[3] ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:983:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( outbuf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:998:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( outstr, strlen( outstr ), handle ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_cgame.c:1403:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tagnameSize = strlen( tagname ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:288:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buffer, strlen( buffer ), f ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:666:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). skip = strlen( buf ) + 2; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:672:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). skip = strlen( buf ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_console.c:739:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen( Q3_VERSION ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1310:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1360:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = drawLen - strlen( str ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1397:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pasteLen = strlen( cbd ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1425:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:1489:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2013:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( cmd, " " ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2541:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( numChars > ( strlen( consoleSaveBuffer ) - ( text_p - consoleSaveBuffer ) ) ) data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2588:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLength = strlen( historyEditLines[ i ].buffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2589:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). saveBufferLength = strlen( consoleSaveBuffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2592:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). additionalLength = lineLength + strlen( "999 999 999 " ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_keys.c:2610:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). consoleSaveBufferSize = strlen( consoleSaveBuffer ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:923:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( cl_timedemoLog && strlen( cl_timedemoLog->string ) > 0 ) data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1711:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( cl_cdkey ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1778:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( cl_reconnectArgs ) ) data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1860:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CL_UpdateGUID( serverString, strlen( serverString ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1957:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( rconAddress->string ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:1970:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( NS_CLIENT, strlen( message ) + 1, message, to ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2309:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zippath[strlen(zippath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2340:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = localName + strlen( localName ); // point at the nul byte data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2389:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( clc.downloadList, s, strlen( s ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2411:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cl_updatefiles->string ) > 4 ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:2521:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_OutOfBandData( NS_CLIENT, clc.serverAddress, (byte *) data, strlen ( data ) ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3308:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( itemStr, " " ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:3377:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( cacheItems[i][j].name, strlen( cacheItems[i][j].name ), handle ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4359:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( info ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4360:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( info[strlen( info ) - 1] != '\n' ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4526:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( serverStatus->string ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4535:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( serverStatus->string ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4553:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( serverStatus->string ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4601:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( NS_CLIENT, strlen( message ), message, to ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:4603:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( NS_CLIENT, strlen( message ), message, to ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5099:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( key ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5104:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( checksum && strlen( checksum ) != CDCHKSUM_LEN ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5203:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, cl.limboChatMsgs[index], 140 ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5237:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( t->original, original, MAX_TRANS_STRING ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5242:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( t->translated[i], translated[i], MAX_TRANS_STRING ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5336:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cl.translationVersion ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5342:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5360:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( t->translated[0] ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5373:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5377:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5381:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5385:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5389:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5393:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5429:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( original ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5440:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( translated ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5454:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( format_org ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5456:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( len != strlen( format_trans ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5601:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( t->translated[i], translated[i], MAX_TRANS_STRING ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5713:76: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if ( currentLanguage == -1 || currentLanguage >= MAX_LANGUAGES || !strlen( string ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5718:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( string[strlen( string ) - 1] == '\n' ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5731:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( t && strlen( t->translated[currentLanguage] ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5744:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len2 = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5753:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len2 = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5771:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len2 = strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5808:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( p ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_main.c:5824:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !url || !strlen( url ) ) { data/iortcw-1.51.c+dfsg1/MP/code/client/cl_parse.c:629:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:350:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SCR_DrawStringExt( 320 - strlen( string ) * 4, 20, 8, string, g_color_table[7], qtrue, qfalse ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:388:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SCR_DrawStringExt( 320 - strlen( string ) * 4, 10, 8, string, g_color_table[7], qtrue, qfalse ); data/iortcw-1.51.c+dfsg1/MP/code/client/cl_scrn.c:411:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). w = strlen( string ) * TINYCHAR_WIDTH; data/iortcw-1.51.c+dfsg1/MP/code/client/cl_ui.c:1040:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( VMA(1), VMA(2), args[3] ); data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:149:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN(sizeof(lm->identity)/sizeof(wchar_t), strlen(identity)+1); data/iortcw-1.51.c+dfsg1/MP/code/client/libmumblelink.c:167:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN(sizeof(lm->description)/sizeof(wchar_t), strlen(description)+1); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.c:187:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return stream->codec->read(stream, bytes, buffer); data/iortcw-1.51.c+dfsg1/MP/code/client/snd_codec.h:64:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). CODEC_READ read; data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:292:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) >= MAX_QPATH) { data/iortcw-1.51.c+dfsg1/MP/code/client/snd_dma.c:380:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:207:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( filename ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:2696:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while((curlen = strlen(devicelist))) data/iortcw-1.51.c+dfsg1/MP/code/client/snd_openal.c:2791:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while((curlen = strlen(inputdevicelist))) data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast.c:717:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( loading ) > 0 && atoi( loading ) != 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_characters.c:1463:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !ent->aiSkin || !strlen( ent->aiSkin ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_debug.c:119:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !param || strlen( param ) < 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_debug.c:157:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->classname = G_Alloc( strlen( cmd ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:314:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( filename ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:442:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:449:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:455:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:456:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:457:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:478:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:500:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:501:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->stack.items[curEvent->stack.numItems].params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:502:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->stack.items[curEvent->stack.numItems].params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:604:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:620:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:633:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:673:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_script.c:708:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_think.c:740:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cast_think.c:867:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:75:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:75:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:102:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:102:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:131:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:131:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:162:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:162:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:195:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:195:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:232:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:232:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:271:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( mapname, Info_ValueForKey( info, "mapname" ), sizeof( mapname ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_chat.c:753:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. } else { strcpy( name, "" );} data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:150:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( goalname ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:284:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:399:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:410:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:877:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( bs->subteam, teammate, 32 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:898:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bs->subteam ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:902:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( bs->subteam, "" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:919:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bs->subteam ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_cmd.c:1055:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( bs->teamleader, teammate, sizeof( bs->teamleader ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmnet.c:633:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:275:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( name, Info_ValueForKey( buf, "n" ), size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:294:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( skin, Info_ValueForKey( buf, "model" ), size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:355:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( ptr, ptr + 1, strlen( ptr + 1 ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:362:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str1, str2 + 1, strlen( str2 + 1 ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:363:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else { memmove( str2, str1 + 1, strlen( str1 + 1 ) + 1 );} data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:368:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( name, name + 2, strlen( name + 2 ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:381:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( ptr, ptr + 1, strlen( ptr + 1 ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:384:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, name, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:1947:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( mapname, Info_ValueForKey( info, "mapname" ), sizeof( mapname ) - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_dmq3.c:2266:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( classname, "" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1059:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1064:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1069:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1074:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1079:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1080:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1086:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1087:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1093:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1094:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1099:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1100:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1105:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1110:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1115:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1120:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1125:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1130:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1136:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1137:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1142:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1147:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_main.c:1152:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:63:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( bs->teamleader ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:85:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:85:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:141:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:141:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/ai_team.c:541:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( bs->teamleader, netname, sizeof( bs->teamleader ) ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:450:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( *offset + strlen( string ) + 1 >= bufSize ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:460:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *offset += strlen( string ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:593:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); // unget the token data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:794:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( currentString ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:820:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( token[strlen( token ) - 1] == ',' ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:822:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token[strlen( token ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:825:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( currentString ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:833:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( currentString ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:921:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( token[strlen( token ) - 1] == ',' ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:922:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token[strlen( token ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:967:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *input -= strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1022:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *input -= strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1255:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1257:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1283:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1285:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1377:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1379:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1405:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_animation.c:1407:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:183:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen( const char *string ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:208:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. char *strncat( char *strDestination, const char *strSource, size_t num ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.c:355:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy( char *strDest, const char *strSource, size_t count ) { data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:86:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen( const char *string ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:88:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. char *strncat( char *strDestination, const char *strSource, size_t num ); data/iortcw-1.51.c+dfsg1/MP/code/game/bg_lib.h:94:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy( char *strDest, const char *strSource, size_t count ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:90:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( entry ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:150:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tlen = strlen( arg ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:177:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_cmds.c:1547:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( arg2 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_main.c:1917:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( string, strlen( string ), level.logFile ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:1304:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->nextthink = level.time + ( strlen( ent->dl_stylestring ) * 100 ) - 100; data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:1334:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ent->dl_stylestring && strlen( ent->dl_stylestring ) ) { // if they're specified in a string, use em data/iortcw-1.51.c+dfsg1/MP/code/game/g_misc.c:1343:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->count = strlen( ent->dl_stylestring ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_mover.c:4292:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( ent->spawnflags & 4 ) && ent->model && strlen( ent->model ) ) { // use shader data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:246:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( filename ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:371:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:377:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:378:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:379:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:400:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:422:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:423:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->stack.items[curEvent->stack.numItems].params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:424:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->stack.items[curEvent->stack.numItems].params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script.c:541:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:833:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->tagName = G_Alloc( strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_script_actions.c:834:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( ent->tagName, token, strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:746:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:891:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:1020:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( testid2 ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:1030:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( testid1 ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/game/g_spawn.c:1035:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( testid3 ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:176:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( iplist_final ) + strlen( ip ) < MAX_CVAR_VALUE_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_svcmds.c:176:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( iplist_final ) + strlen( ip ) < MAX_CVAR_VALUE_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:818:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( def ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:1006:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( entry ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:1196:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->message = G_Alloc( strlen( desc ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_team.c:1197:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( ent->message, desc, strlen( desc ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/game/g_trigger.c:681:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !ent->target || !( strlen( ent->target ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:99:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:122:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:152:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( text && strlen( text ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:407:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( cmd_args, " " ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:432:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( cmd_args, " " ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cmd.c:479:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(c) > MAX_CVAR_VALUE_STRING - 1) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:191:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( strlen( msg ) + strlen( rd_buffer ) ) > ( rd_buffersize - 1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:191:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( strlen( msg ) + strlen( rd_buffer ) ) > ( rd_buffersize - 1 ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:244:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( msg, strlen( msg ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:602:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:602:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:643:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:648:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = ptr + strlen( buf ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1122:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1137:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1151:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1153:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1205:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). out = S_Malloc( strlen( in ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1502:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1506:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1512:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1514:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1536:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1555:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1561:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:1563:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2053:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2573:15: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). savedumask = umask(0077); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2594:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(savedumask); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2952:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2962:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for( i = accu; i < accu + read; ++i ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2969:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). buf[ accu + read ] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:2971:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). accu += read; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3413:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_stricmpn( s, completionString, strlen( completionString ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3424:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( i >= strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3442:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_stricmpn( s, shortestMatch, strlen( shortestMatch ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3456:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_stricmpn( s, shortestMatch, strlen( shortestMatch ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3471:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( s ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3492:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). completionOffset = strlen( completionField->buffer ) - strlen( completionString ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3492:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). completionOffset = strlen( completionField->buffer ) - strlen( completionString ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3497:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). completionField->cursor = strlen( completionField->buffer ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3563:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( *( cmd + strlen( cmd ) - 1 ) == ' ' ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3579:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( completionField->buffer ) + 1 >= data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3585:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( completionField->buffer ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/common.c:3617:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( completionString ) == 0 ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:968:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->latchedString ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:968:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->latchedString ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:975:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->string ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:975:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->string ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:982:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buffer, strlen( buffer ), f ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:1418:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cv->string ) + 1 > MAX_CVAR_VALUE_STRING ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/cvar.c:1421:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (unsigned int) strlen(cv->string)); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:509:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove (s, s + 1, strlen (s)); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:678:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). testpath[strlen(testpath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:698:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:753:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen( ospath ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:768:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:784:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:799:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:844:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). from_ospath[strlen( from_ospath ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:845:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). to_ospath[strlen( to_ospath ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1101:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extlen = strlen(ext); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1173:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1323:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1402:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1675:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1798:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1833:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). remaining -= read; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1834:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). buf += read; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:1903:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( msg, strlen( msg ), h ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2318:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( filename_inzip ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2346:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( pack->pakBasename ) > 4 && !Q_stricmp( pack->pakBasename + strlen( pack->pakBasename ) - 4, ".pk3" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2346:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( pack->pakBasename ) > 4 && !Q_stricmp( pack->pakBasename + strlen( pack->pakBasename ) - 4, ".pk3" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2347:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pack->pakBasename[strlen( pack->pakBasename ) - 4] = 0; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2367:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namePtr += strlen( filename_inzip ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2519:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathLength = strlen( path ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2523:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extensionLength = strlen( extension ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2566:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( name ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2674:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nLen = strlen( pFiles[i] ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2888:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nLen = strlen(name) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:2892:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nDescLen = strlen(description) + 1; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3212:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curpath[strlen(curpath) - 1] = '\0'; // strip the trailing slash data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3226:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pakfile[ strlen( pakfile ) - 1 ] = 0; // strip the trailing slash data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3428:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). origpos += strlen(origpos); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3452:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(origpos) + (origpos - neededpaks) >= len - 1) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3742:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(pakBasename) == 7 && !Q_stricmpn( pakBasename, "mp_pak", 6 ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:3865:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(pakBasename) == 4 && !Q_stricmpn( pakBasename, "pak", 3 ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4073:96: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (search->pack->referenced || Q_stricmpn(search->pack->pakGamename, com_basegame->string, strlen(com_basegame->string))) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4101:96: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (search->pack->referenced || Q_stricmpn(search->pack->pakGamename, com_basegame->string, strlen(com_basegame->string))) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4140:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info[strlen( info ) + 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4141:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info[strlen( info ) + 2] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4142:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info[strlen( info )] = '@'; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/files.c:4143:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info[strlen( info )] = ' '; data/iortcw-1.51.c+dfsg1/MP/code/qcommon/json.h:221:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int nameLen = strlen(name); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:326:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/msg.c:352:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_chan.c:593:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( sock, strlen( string ), string, adr ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1154:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ulen = strlen( net_socksUsername->string ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/net_ip.c:1155:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen( net_socksPassword->string ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/pbmd5.c:375:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( strlen( str ) > 2 ) && ( str[0] == '0' ) && ( tolower( str[1] ) == 'x' ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:145:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( out, in, strlen( in ) ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:161:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inlen = strlen(in); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:162:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extlen = strlen(ext); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:729:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i, n = 0, len = strlen( str ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:861:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dest, src, destsize-1 ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:955:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen( dest ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:976:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(find); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1131:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( len = strlen( temp_buffer ) ) >= MAX_VA_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1156:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1223:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1318:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1354:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1376:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1412:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1455:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1469:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !value || !strlen( value ) ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1475:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1475:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1496:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1516:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1516:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/qcommon/q_shared.c:1538:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( set ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/qcommon/vm.c:279:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chars = strlen( token ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2667:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2683:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2778:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). keyLength = strlen(keyname) + 1; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_bsp.c:2779:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tokenLength = strlen(com_token) + 1; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_fbo.c:84:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:441:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(shaderText); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:509:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:519:80: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(GLSL_CompileGPUShader(program->program, &program->vertexShader, vpCode, strlen(vpCode), GL_VERTEX_SHADER))) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:528:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!(GLSL_CompileGPUShader(program->program, &program->fragmentShader, fpCode, strlen(fpCode), GL_FRAGMENT_SHADER))) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:600:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). postHeader = &vpCode[strlen(vpCode)]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:601:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size -= strlen(vpCode); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:619:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). postHeader = &fpCode[strlen(fpCode)]; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_glsl.c:620:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size -= strlen(fpCode); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:2187:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3238:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_image.c:3269:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp( name + strlen( name ) - 5, ".skin" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_init.c:1129:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int remainingLength = strlen(string); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:86:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 first data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:88:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC first data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC second data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:96:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 second data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:348:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:733:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(surf->name); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model.c:1274:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(surf->name); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:473:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). joint_names += strlen( (char *)header + header->ofs_text + data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:799:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( name ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_model_iqm.c:1672:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names += strlen( names ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shade_calc.c:361:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:2336:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). normalName[strlen(normalName) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3550:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3584:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3614:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3832:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( textEnd, "\n" ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_shader.c:3833:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textEnd += strlen( textEnd ); data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:122:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/MP/code/rend2/tr_vbo.c:190:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:2097:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_bsp.c:2113:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1118:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1895:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_image.c:1926:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp( name + strlen( name ) - 5, ".skin" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_init.c:1034:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int remainingLength = strlen(string); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:86:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 first data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:88:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC first data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC second data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:96:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 second data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:115:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename[strlen( filename ) - 1] = 'c'; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:367:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:993:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( surf->name ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model.c:1211:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( surf->name ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model_iqm.c:470:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). joint_names += strlen( (char *)header + header->ofs_text + data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model_iqm.c:796:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( name ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_model_iqm.c:1409:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names += strlen( names ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shade_calc.c:350:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:2812:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:2846:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:2876:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:3095:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( textEnd, "\n" ); data/iortcw-1.51.c+dfsg1/MP/code/renderer/tr_shader.c:3096:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textEnd += strlen( textEnd ); data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:245:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( newModeString ) < (int)sizeof( buf ) - strlen( buf ) ) data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:245:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( newModeString ) < (int)sizeof( buf ) - strlen( buf ) ) data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:253:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[ strlen( buf ) - 1 ] = 0; data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:349:3: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf( version, "OpenGL %5s %d.%d", profile, &qglesMajorVersion, &qglesMinorVersion ); data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:1186:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*glConfig.renderer_string && glConfig.renderer_string[strlen(glConfig.renderer_string) - 1] == '\n') data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:1187:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glConfig.renderer_string[strlen(glConfig.renderer_string) - 1] = 0; data/iortcw-1.51.c+dfsg1/MP/code/sdl/sdl_glimp.c:1203:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extensionLength = strlen( extension ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:931:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write(writebuf, strlen(writebuf), writeto); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1405:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = 39 - strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1445:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p[strlen( p ) - 1] = 0; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_ccmds.c:1485:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p[strlen(p)-1] = 0; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:419:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( ( strlen( ip ) + strlen( userinfo ) + 4 ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:419:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( ( strlen( ip ) + strlen( userinfo ) + 4 ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1512:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( val ) ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1525:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( val ) ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1527:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( i <= 0 || i > 100 || strlen( val ) > 4 ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1535:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(val)) data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1578:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) - strlen( val ) + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1578:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) - strlen( val ) + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1578:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) - strlen( val ) + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1580:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) + 4 + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_client.c:1580:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) + 4 + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:852:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( VMA(1), VMA(2), args[3] ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:1008:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( text && strlen( text ) ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_game.c:1009:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLen = strlen( text ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:51:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sv.configstrings[index]); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_init.c:687:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( p ) == 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:196:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( (char *)message ) > 1022 ) { data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:585:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(Cmd_Argv(1)) > 128) data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:603:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). playerLength = strlen( player ); data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:659:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(Cmd_Argv(1)) > 128) data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:816:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( sv_rconPassword->string ) || data/iortcw-1.51.c+dfsg1/MP/code/server/sv_main.c:843:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( sv_rconPassword->string ) ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_parse.cpp:339:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( *punc ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:107:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inlen = strlen(in); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:108:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extlen = strlen(ext); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:145:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( out, in, strlen( in ) ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:769:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 2; i < strlen( str ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:919:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dest, src, destsize - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1001:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen( dest ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1022:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(find); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1170:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( len = strlen( temp_buffer ) ) >= MAX_VA_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1221:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1288:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1383:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1419:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1441:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1520:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1534:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !value || !strlen( value ) ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1540:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1540:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1560:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1579:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1579:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/MP/code/splines/q_shared.cpp:1601:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( set ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/splines/splines.cpp:123:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qglCallLists( strlen( label ), GL_UNSIGNED_BYTE, label ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:237:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:367:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( m_data->data, olddata->data, len + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.cpp:450:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dst, buffer, size - 1 ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:181:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:253:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:267:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:281:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:310:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = length() + strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:406:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:429:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( text ) < (unsigned) m_data->len ); data/iortcw-1.51.c+dfsg1/MP/code/splines/util_str.h:443:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_log.c:63:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int length = strlen( in ); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:126:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(TTY_CONSOLE_PROMPT); i > 0; i--) { data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:152:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = write(STDOUT_FILENO, TTY_CONSOLE_PROMPT, strlen(TTY_CONSOLE_PROMPT)); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:344:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). avail = read(STDIN_FILENO, &key, 1); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:400:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = write(STDOUT_FILENO, TTY_CONSOLE_PROMPT, strlen(TTY_CONSOLE_PROMPT)); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:411:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). avail = read(STDIN_FILENO, &key, 1); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:417:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). avail = read(STDIN_FILENO, &key, 1); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:483:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). len = read(STDIN_FILENO, text, sizeof(text)); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_tty.c:523:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') { data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c:142:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qconsole_linelen = strlen( qconsole_line ); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c:175:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qconsole_linelen = strlen( qconsole_line ); data/iortcw-1.51.c+dfsg1/MP/code/sys/con_win32.c:419:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qconsole_linelen = strlen( qconsole_line ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_main.c:153:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t bufsize = strlen( cliptext ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:370:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:388:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:457:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extLen = strlen( extension ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:476:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( d->d_name ) < extLen || data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:478:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d->d_name + strlen( d->d_name ) - extLen, data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:567:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep( msec * 1000 ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:656:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( text ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_unix.c:971:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen( DLL_EXT ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:377:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( path ) - 1; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:388:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( base ) - 1; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:408:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( dir ) - 1; data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:427:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( ospath ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:502:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:517:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:548:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l0 = strlen(s0); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:549:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen(s1); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:615:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extLen = strlen( extension ); data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:631:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( findinfo.name ) < extLen || data/iortcw-1.51.c+dfsg1/MP/code/sys/sys_win32.c:633:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). findinfo.name + strlen( findinfo.name ) - extLen, data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:237:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(BASEDIRNAME); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:238:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (c=path+strlen(path)-1 ; c != path ; c--) data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:256:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (qdir, path, c+len+count-path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:258:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( qdir ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:269:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (gamedir, path, c+1-path); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:271:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( gamedir ); i++ ) data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:281:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ( writedir[strlen( writedir )-1] != '/' ) data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:283:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writedir[strlen( writedir )] = '/'; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:284:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writedir[strlen( writedir )+1] = 0; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:357:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). b = malloc(strlen(s)+1); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:400:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(out, "."); /* shrug */ data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:401:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (out, "\\"); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:404:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(out, "."); /* shrug */ data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:405:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (out, "/"); data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:816:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:845:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path)-1; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:855:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path)-1; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:878:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:894:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/cmdlib.c:913:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/MP/code/tools/asm/q3asm.c:705:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(token, q, p - q); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_atoms.c:251:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( gameFile ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:99:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc( strlen( info ) + strlen( "\\num\\" ) + strlen( va( "%d", MAX_ARENAS ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:99:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc( strlen( info ) + strlen( "\\num\\" ) + strlen( va( "%d", MAX_ARENAS ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:99:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc( strlen( info ) + strlen( "\\num\\" ) + strlen( va( "%d", MAX_ARENAS ) ) + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:165:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_gameinfo.c:326:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:477:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:512:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:579:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:684:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:771:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = text + strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:790:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = text + strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:844:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:964:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3456:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3460:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirptr += dirlen + strlen( descptr ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3533:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( sgname ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3572:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( moviename ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:3619:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(demoname); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4048:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !s || !strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4061:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !s || !strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4099:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !s || !strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4106:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( s && strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4163:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( s && strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4182:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( s && strlen( s ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4311:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4657:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( buff[0] != 32 && strlen( buff ) == CDKEY_LEN ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4763:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) && strcmp( s, "localhost" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4784:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) && strcmp( s, "localhost" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4798:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) && strcmp( s, "localhost" ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4907:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4907:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4927:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4939:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:4939:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5386:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( uiInfo.serverStatus.motd ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5389:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( uiInfo.serverStatus.motd ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5614:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( serverStatusCvars[i].altName ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5746:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( &info->pings[len] ) + 1; data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:5815:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( uiInfo.findPlayerName ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7218:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( strlen( buf ) ) && ( Q_stricmp( buf,";" ) ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7309:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d GB", data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7309:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d GB", data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7313:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d MB", data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7313:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d MB", data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7490:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_main.c:7977:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) ) { data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_players.c:1126:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); // unget the token data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:271:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( p ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:2480:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buff ); data/iortcw-1.51.c+dfsg1/MP/code/ui/ui_shared.c:3450:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buff, start, p - start + 1 ); data/iortcw-1.51.c+dfsg1/MP/code/zlib-1.2.11/unzip.c:1260:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(szFileName)>=UNZ_MAXFILENAMEINZIP) data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:284:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( value, epair->value, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:425:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsize += strlen( token.string ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:432:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufsize += strlen( token.string ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:469:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). epair->key = (char *) buftrav; buftrav += ( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:477:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). epair->value = (char *) buftrav; buftrav += ( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_bspq3.c:519:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bspworld.entdatasize = strlen( botimport.BSPEntityData() ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:170:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( *aasworld ).configstrings[i] = (char *) GetMemory( strlen( configstrings[i] ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:367:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strcat( this_mapname, sizeof( this_mapname ) - strlen( this_mapname ) - 1, "_b" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_aas_main.c:369:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strcat( this_mapname, sizeof( this_mapname ) - strlen( this_mapname ) - 1, intstr ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:197:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch->c[i].value.string = (char *) GetMemory( strlen( defaultch->c[i].value.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:289:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ch->c[index].value.string = GetMemory( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:528:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). out->c[i].value.string = (char *) GetMemory( strlen( ch1->c[i].value.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_char.c:739:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, ch->c[index].value.string, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:453:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( &message[i], &message[i + 1], strlen( &message[i + 1] ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:477:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( oldptr, ptr, strlen( ptr ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:496:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:496:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:529:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:529:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:585:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( str2 <= str && str < str2 + strlen( replacement ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:591:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:591:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:591:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:591:81: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str + strlen( replacement ), str + strlen( synonym ), strlen( str + strlen( synonym ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:593:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy( str, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:596:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = StringContainsWord( str + strlen( replacement ), synonym, qfalse ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:715:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token.string ) <= 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:720:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(token.string) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:885:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str1 + strlen( replacement ), str1 + strlen( synonym->string ), data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:885:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str1 + strlen( replacement ), str1 + strlen( synonym->string ), data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:886:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( str1 + strlen( synonym->string ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:886:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( str1 + strlen( synonym->string ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:888:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy( str1, replacement, strlen( replacement ) ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:925:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + strlen( token.string ) + 1 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:925:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + strlen( token.string ) + 1 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:933:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + 7 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:937:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf( &ptr[strlen( ptr )], "%cv%ld%c", ESCAPE_CHAR, token.intvalue, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:941:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) + 7 > MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:945:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf( &ptr[strlen( ptr )], "%cr%s%c", ESCAPE_CHAR, token.string, ESCAPE_CHAR ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1035:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(token.string) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1063:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chatmessagestring) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1250:93: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). matchstring = (bot_matchstring_t *) GetClearedHunkMemory( sizeof( bot_matchstring_t ) + strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1253:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( token.string ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1419:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( ms->string ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1442:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strptr = newstrptr + strlen( ms->string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1452:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !mp && ( lastvariable >= 0 || !strlen( strptr ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1455:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match->variables[lastvariable].length = strlen( match->variables[lastvariable].ptr ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1473:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while ( strlen( match->string ) && data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1474:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match->string[strlen( match->string ) - 1] == '\n' ) data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1476:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). match->string[strlen( match->string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1504:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1512:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, match->variables[variable].ptr, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1517:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1585:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = GetClearedMemory( sizeof( bot_stringlist_t ) + strlen( temp ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1827:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( namebuffer, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1836:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( namebuffer ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1837:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( namebuffer, "\\" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1846:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key->string = (char *) GetClearedHunkMemory( strlen( namebuffer ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1858:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). key->string = (char *) GetClearedHunkMemory( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:1887:92: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chatmessage = (bot_chatmessage_t *) GetClearedHunkMemory( sizeof( bot_chatmessage_t ) + strlen( chatmessagestring ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2035:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(chatmessagestring) + 1; data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2231:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( len + strlen( temp ) >= MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2236:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( temp ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2258:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( len + strlen( ptr ) >= MAX_MESSAGE_SIZE ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2263:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( ptr ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2432:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[0].length = strlen( var0 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2436:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[1].length = strlen( var1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2440:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[2].length = strlen( var2 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2444:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[3].length = strlen( var3 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2448:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[4].length = strlen( var4 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2452:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[5].length = strlen( var5 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2456:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[6].length = strlen( var6 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2460:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). variables[7].length = strlen( var7 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2614:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[0].length = strlen( var0 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2618:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[1].length = strlen( var1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2622:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[2].length = strlen( var2 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2626:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[3].length = strlen( var3 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2630:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[4].length = strlen( var4 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2634:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[5].length = strlen( var5 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2638:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[6].length = strlen( var6 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2642:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bestmatch.variables[7].length = strlen( var7 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2674:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen( cs->chatmessage ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2690:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cs->chatmessage ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2700:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( cs->chatmessage, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2718:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, cs->chatmessage, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2721:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( cs->chatmessage, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_chat.c:2757:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( cs->name, name, sizeof( cs->name ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:644:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( name, itemconfig->iteminfo[li->iteminfo].name, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_goal.c:649:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( name, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_ai_weight.c:366:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). config->weights[config->numweights].name = (char *) GetClearedMemory( strlen( token.string ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/be_interface.c:266:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( value, varvalue, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c:90:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->name = (char *) GetMemory(strlen(var_name)+1); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c:194:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->string = (char *) GetMemory( strlen( value ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_libvar.c:245:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). v->string = (char *) GetMemory( strlen( value ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_log.c:69:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !filename || !strlen( filename ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:466:2: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:469:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string, t->string, MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:469:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat( token->string, t->string, MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:471:2: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat( token->string, "\"", MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:471:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat( token->string, "\"", MAX_TOKEN - strlen( token->string ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:489:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). t1->string[strlen( t1->string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:678:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). define->name = (char *) GetMemory(strlen(builtin[i].string) + 1); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:723:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->subtype = strlen( token->string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:732:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:733:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string, curtime + 4, 7 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:734:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string + 7, curtime + 20, 4 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:735:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:738:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->subtype = strlen( token->string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:747:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:748:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat( token->string, curtime + 11, 8 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:749:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( token->string, "\"" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:752:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->subtype = strlen( token->string ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:934:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(ptr, ptr+1, strlen(ptr)); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:1002:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( path ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:1190:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). define->name = (char *) GetMemory(strlen(token.string) + 1); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:1295:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). script = LoadScriptMemory( string, strlen( string ), "*extern" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:1424:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). newdefine->name = (char *) GetMemory(strlen(define->name) + 1); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2380:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token.string, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2411:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( token.string, "-" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2722:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token->string[strlen( token->string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2723:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token->string ) + strlen( newtoken.string + 1 ) + 1 >= MAX_TOKEN ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2723:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token->string ) + strlen( newtoken.string + 1 ) + 1 >= MAX_TOKEN ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2796:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( str, "" ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2817:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str, ""); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_precomp.c:2958:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(source->includepath); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:192:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( p->p ) < strlen( newp->p ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:192:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( p->p ) < strlen( newp->p ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:808:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( p ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:959:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str, ""); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:980:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(str, ""); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1140:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(string, string+1, strlen(string)); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1142:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( string[strlen( string ) - 1] == '\"' ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1143:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string[strlen( string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1154:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(string, string+1, strlen(string)); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1156:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( string[strlen( string ) - 1] == '\'' ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1157:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string[strlen( string ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1288:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( value ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_script.c:1339:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( basefolder ) ) { data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_struct.c:226:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( (char *) p, token.string, MAX_STRINGFIELD - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/botlib/l_struct.c:367:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( buf ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:80:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:125:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:184:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:280:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( num ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:2894:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:3052:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = 0.5 * ( 640 - BIGCHAR_WIDTH * strlen( deploytime ) ); //CG_DrawStrlen( deploytime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:3055:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). x = 0.5 * ( 640 - BIGCHAR_WIDTH * strlen( deploytime ) ); //CG_DrawStrlen( deploytime ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_draw.c:3953:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cg_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_ents.c:342:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). stringlength = strlen( cent->dl_stylestring ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_event.c:1213:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( s && strlen( s ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_flamethrower.c:1309:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( str, strlen( str ), f ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:376:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( cg.snap && ( strlen( cg_missionStats.string ) <= 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_info.c:397:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cg_missionStats.string ) > 1 && cg_missionStats.string[0] == 's' ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:641:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( str ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:650:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( cent->dl_stylestring, token, strlen( token ) ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:656:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cent->dl_oldframe = strlen( cent->dl_stylestring ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:665:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( j = 0; j < strlen( cent->dl_stylestring ); j++ ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:778:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( bg_itemlist[i].pickup_name && strlen( bg_itemlist[i].pickup_name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:823:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). translateStrings[i].localname = (char *)trap_Alloc( strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:825:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). translateStrings[i].localname = (char *)malloc( strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:1572:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( parm1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:2156:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !translateStrings[i].name || !strlen( translateStrings[i].name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_main.c:2161:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( translateStrings[i].localname && strlen( translateStrings[i].localname ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_newdraw.c:1835:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:679:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CG_DrawStringExt( 632 - GIANT_WIDTH * strlen( s ), y, s, color, qtrue, qtrue, GIANT_WIDTH, GIANT_HEIGHT, 0 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:685:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CG_DrawStringExt( 632 - GIANT_WIDTH * strlen( s ), y, s, color, qtrue, qtrue, GIANT_WIDTH, GIANT_HEIGHT, 0 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_scoreboard.c:701:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CG_DrawStringExt( 632 - GIANT_WIDTH * strlen( s ), y, s, color, qtrue, qtrue, GIANT_WIDTH, GIANT_HEIGHT, 0 ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:351:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( originalShader, o, n - o ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:356:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( newShader, n, t - n ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_servercmds.c:364:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( timeOffset, t, o - t ); data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_snapshot.c:153:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_view.c:1232:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !( cstr = (char *)CG_ConfigString( CS_SKYBOXORG ) ) || !strlen( cstr ) ) { data/iortcw-1.51.c+dfsg1/SP/code/cgame/cg_view.c:1239:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cg_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_avi.c:96:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_Memcpy( &buffer[ bufIndex ], s, strlen( s ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_avi.c:97:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bufIndex += strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:246:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( dup ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:314:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:314:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:323:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) + 1 >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:323:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bigConfigString ) + strlen( s ) + 1 >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:327:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( bigConfigString, "\"" ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:692:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( VMA(1), VMA(2), args[3] ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:923:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( outbuf ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:938:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( outstr, strlen( outstr ), handle ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_cgame.c:1352:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tagnameSize = strlen( tagname ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_console.c:280:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buffer, strlen( buffer ), f ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_console.c:699:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen( Q3_VERSION ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1310:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1360:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = drawLen - strlen( str ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1397:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pasteLen = strlen( cbd ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1425:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:1489:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2013:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( cmd, " " ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2530:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( numChars > ( strlen( consoleSaveBuffer ) - ( text_p - consoleSaveBuffer ) ) ) data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2577:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLength = strlen( historyEditLines[ i ].buffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2578:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). saveBufferLength = strlen( consoleSaveBuffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2581:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). additionalLength = lineLength + strlen( "999 999 999 " ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_keys.c:2599:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). consoleSaveBufferSize = strlen( consoleSaveBuffer ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:908:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( cl_timedemoLog && strlen( cl_timedemoLog->string ) > 0 ) data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1631:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( cl_cdkey ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1700:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( cl_reconnectArgs ) ) data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1778:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CL_UpdateGUID( serverString, strlen( serverString ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1855:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( rconAddress->string ) ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1868:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( NS_CLIENT, strlen( message ) + 1, message, to ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:1975:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( musicCvar.string ) ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2188:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). zippath[strlen(zippath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2219:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = localName + strlen( localName ); // point at the nul byte data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2268:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( clc.downloadList, s, strlen( s ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:2385:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_OutOfBandData( NS_CLIENT, clc.serverAddress, (byte *) data, strlen ( data ) ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3119:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( itemStr, " " ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:3188:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( cacheItems[i][j].name, strlen( cacheItems[i][j].name ), handle ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4098:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( info ) ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4099:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( info[strlen( info ) - 1] != '\n' ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4256:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( serverStatus->string ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4265:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( serverStatus->string ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4283:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( serverStatus->string ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4331:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( NS_CLIENT, strlen( message ), message, to ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4333:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( NS_CLIENT, strlen( message ), message, to ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4816:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( key ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4821:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( checksum && strlen( checksum ) != CDCHKSUM_LEN ) { data/iortcw-1.51.c+dfsg1/SP/code/client/cl_main.c:4920:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, cl.limboChatMsgs[index], 140 ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_parse.c:500:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:350:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SCR_DrawStringExt( 320 - strlen( string ) * 4, 20, 8, string, g_color_table[7], qtrue, qfalse ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_scrn.c:388:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). SCR_DrawStringExt( 320 - strlen( string ) * 4, 10, 8, string, g_color_table[7], qtrue, qfalse ); data/iortcw-1.51.c+dfsg1/SP/code/client/cl_ui.c:1050:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( VMA(1), VMA(2), args[3] ); data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:149:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN(sizeof(lm->identity)/sizeof(wchar_t), strlen(identity)+1); data/iortcw-1.51.c+dfsg1/SP/code/client/libmumblelink.c:167:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN(sizeof(lm->description)/sizeof(wchar_t), strlen(description)+1); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.c:187:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return stream->codec->read(stream, bytes, buffer); data/iortcw-1.51.c+dfsg1/SP/code/client/snd_codec.h:64:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). CODEC_READ read; data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:283:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) >= MAX_QPATH) { data/iortcw-1.51.c+dfsg1/SP/code/client/snd_dma.c:371:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:208:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( filename ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:2753:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while((curlen = strlen(devicelist))) data/iortcw-1.51.c+dfsg1/SP/code/client/snd_openal.c:2848:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while((curlen = strlen(inputdevicelist))) data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast.c:745:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( loading ) > 0 && atoi( loading ) != 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_characters.c:1370:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !ent->aiSkin || !strlen( ent->aiSkin ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_debug.c:119:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !param || strlen( param ) < 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_debug.c:157:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->classname = G_Alloc( strlen( cmd ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:360:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( filename ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:491:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:498:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:504:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:505:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:506:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:527:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:545:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token ) ) { // we know there's a [0], but don't know if it's '0' data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:571:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:572:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->stack.items[curEvent->stack.numItems].params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:573:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->stack.items[curEvent->stack.numItems].params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:675:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:691:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:704:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script.c:779:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ( ( strlen( aicast_debugname.string ) < 1 ) || ( g_entities[cs->entityNum].aiName && !strcmp( aicast_debugname.string, g_entities[cs->entityNum].aiName ) ) ) ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_script_actions.c:465:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( loading ) > 0 && atoi( loading ) != 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_think.c:809:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cast_think.c:966:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:75:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:75:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:102:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:102:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:131:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:131:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:162:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:162:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:195:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:195:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:232:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:232:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:271:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( mapname, Info_ValueForKey( info, "mapname" ), sizeof( mapname ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_chat.c:753:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. } else { strcpy( name, "" );} data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:150:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( goalname ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:284:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:399:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:410:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:877:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( bs->subteam, teammate, 32 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:898:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bs->subteam ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:902:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( bs->subteam, "" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:919:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( bs->subteam ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_cmd.c:1055:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( bs->teamleader, teammate, sizeof( bs->teamleader ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmnet.c:633:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:276:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( name, Info_ValueForKey( buf, "n" ), size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:295:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( skin, Info_ValueForKey( buf, "model" ), size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:355:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( ptr, ptr + 1, strlen( ptr + 1 ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:362:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( str1, str2 + 1, strlen( str2 + 1 ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:363:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else { memmove( str2, str1 + 1, strlen( str1 + 1 ) + 1 );} data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:368:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( name, name + 2, strlen( name + 2 ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:381:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove( ptr, ptr + 1, strlen( ptr + 1 ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:384:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buf, name, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:1940:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( mapname, Info_ValueForKey( info, "mapname" ), sizeof( mapname ) - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_dmq3.c:2259:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( classname, "" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1060:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1065:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1070:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1075:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1080:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1081:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1087:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1088:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1094:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1095:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1100:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1101:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1107:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1112:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1117:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1122:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1127:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1132:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1138:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1139:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy( buf, "0" ); data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1144:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1149:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_main.c:1154:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:63:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( bs->teamleader ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:85:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:85:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:141:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:141:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( buf ) || !strlen( Info_ValueForKey( buf, "n" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/ai_team.c:541:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( bs->teamleader, netname, sizeof( bs->teamleader ) ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:460:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( *offset + strlen( string ) + 1 >= bufSize ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:470:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *offset += strlen( string ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:603:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); // unget the token data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:821:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( currentString ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:847:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( token[strlen( token ) - 1] == ',' ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:849:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token[strlen( token ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:852:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( currentString ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:860:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( currentString ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:948:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( token[strlen( token ) - 1] == ',' ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:949:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). token[strlen( token ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:994:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *input -= strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1049:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *input -= strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1306:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1308:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1334:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1336:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1428:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1430:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1456:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_animation.c:1458:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_strncmp( text_p, token, strlen( token ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:215:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen( const char *string ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:240:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. char *strncat( char *strDestination, const char *strSource, size_t num ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.c:387:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy( char *strDest, const char *strSource, size_t count ) { data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:86:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen( const char *string ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:88:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. char *strncat( char *strDestination, const char *strSource, size_t num ); data/iortcw-1.51.c+dfsg1/SP/code/game/bg_lib.h:94:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy( char *strDest, const char *strSource, size_t count ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_active.c:951:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:76:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( entry ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:135:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tlen = strlen( arg ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:162:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_cmds.c:270:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !name || !strlen( name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1279:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) < 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_main.c:1952:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( string, strlen( string ), level.logFile ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:1330:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->nextthink = level.time + ( strlen( ent->dl_stylestring ) * 100 ) - 100; data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:1360:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ent->dl_stylestring && strlen( ent->dl_stylestring ) ) { // if they're specified in a string, use em data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:1369:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->count = strlen( ent->dl_stylestring ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:2636:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->target_ent->tagName = G_Alloc( strlen( tagName ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:2637:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( ent->target_ent->tagName, tagName, strlen( tagName ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:2639:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->tagName = G_Alloc( strlen( tagName ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_misc.c:2640:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( ent->tagName, tagName, strlen( tagName ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_mover.c:4458:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( ent->spawnflags & 4 ) && ent->model && strlen( ent->model ) ) { // use shader data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:319:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( *(char **)p ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:367:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( func->funcStr ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:388:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( *(char **)p ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:400:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( func->funcStr ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1124:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( username ); i++ ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1194:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( mapstr ); i++ ) mapstr[i] = toupper( mapstr[i] ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1198:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( leveltime ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1203:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( healthstr ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1224:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen( infoString ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1229:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !G_SaveWrite( infoString, strlen( infoString ), f ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1251:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen( infoString ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1260:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !G_SaveWrite( infoString, strlen( infoString ), f ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1459:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( musicString ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_save.c:1616:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( musicString ) ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:256:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( filename ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:379:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:385:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:386:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:387:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:408:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // add a space between each param data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:426:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( token ) ) { // we know there's a [0], but don't know if it's '0' data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:446:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( params ) ) { // copy the params into the event data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:447:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curEvent->stack.items[curEvent->stack.numItems].params = G_Alloc( strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:448:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( curEvent->stack.items[curEvent->stack.numItems].params, params, strlen( params ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script.c:565:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( g_missionStats.string ) > 1 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1003:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ent->tagName = G_Alloc( strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_script_actions.c:1004:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( ent->tagName, token, strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:737:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/game/g_spawn.c:884:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:158:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( iplist_final ) + strlen( ip ) < MAX_CVAR_VALUE_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:158:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( iplist_final ) + strlen( ip ) < MAX_CVAR_VALUE_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_svcmds.c:481:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cmd ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/game/g_team.c:804:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( entry ); data/iortcw-1.51.c+dfsg1/SP/code/game/g_trigger.c:693:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !ent->target || !( strlen( ent->target ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:99:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:122:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:152:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( text && strlen( text ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:408:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( cmd_args, " " ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:433:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( cmd_args, " " ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cmd.c:481:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(c) > MAX_CVAR_VALUE_STRING - 1) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:191:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( strlen( msg ) + strlen( rd_buffer ) ) > ( rd_buffersize - 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:191:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( strlen( msg ) + strlen( rd_buffer ) ) > ( rd_buffersize - 1 ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:244:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( msg, strlen( msg ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:627:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:627:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str1 ) - strlen( str2 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:668:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:673:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name = ptr + strlen( buf ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:885:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). out = Z_Malloc( strlen( in ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1056:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1060:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1066:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1068:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1090:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1109:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1115:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1117:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buf, strlen( buf ), logfile ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:1604:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( s ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2122:15: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). savedumask = umask(0077); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2142:2: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). umask(savedumask); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2499:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2509:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). for( i = accu; i < accu + read; ++i ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2516:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). buf[ accu + read ] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2518:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). accu += read; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2961:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( Q_stricmpn( s, completionString, strlen( completionString ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2972:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( i >= strlen( s ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:2990:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_stricmpn( s, shortestMatch, strlen( shortestMatch ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3004:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_stricmpn( s, shortestMatch, strlen( shortestMatch ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3019:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( s ); i++ ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3040:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). completionOffset = strlen( completionField->buffer ) - strlen( completionString ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3040:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). completionOffset = strlen( completionField->buffer ) - strlen( completionString ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3045:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). completionField->cursor = strlen( completionField->buffer ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3111:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( *( cmd + strlen( cmd ) - 1 ) == ' ' ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3127:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( completionField->buffer ) + 1 >= data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3133:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen( completionField->buffer ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/common.c:3165:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( completionString ) == 0 ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:929:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->latchedString ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:929:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->latchedString ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:936:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->string ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:936:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( var->name ) + strlen( var->string ) + 10 > sizeof( buffer ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:943:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( buffer, strlen( buffer ), f ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:1382:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( cv->string ) + 1 > MAX_CVAR_VALUE_STRING ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/cvar.c:1385:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (unsigned int) strlen(cv->string)); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:524:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove (s, s + 1, strlen (s)); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:802:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). testpath[strlen(testpath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:822:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:877:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:892:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:908:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:923:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ospath[strlen(ospath)-1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:967:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). from_ospath[strlen( from_ospath ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:968:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). to_ospath[strlen( to_ospath ) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1304:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extlen = strlen(ext); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1489:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1559:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(filename); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1803:6: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1838:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). remaining -= read; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1839:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). buf += read; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:1909:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write( msg, strlen( msg ), h ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2327:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( filename_inzip ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2355:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( pack->pakBasename ) > 4 && !Q_stricmp( pack->pakBasename + strlen( pack->pakBasename ) - 4, ".pk3" ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2355:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( pack->pakBasename ) > 4 && !Q_stricmp( pack->pakBasename + strlen( pack->pakBasename ) - 4, ".pk3" ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2356:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pack->pakBasename[strlen( pack->pakBasename ) - 4] = 0; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2376:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namePtr += strlen( filename_inzip ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2528:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathLength = strlen( path ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2532:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extensionLength = strlen( extension ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2575:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( name ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2684:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nLen = strlen( pFiles[i] ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2897:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nLen = strlen(name) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:2901:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nDescLen = strlen(description) + 1; data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3218:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curpath[strlen(curpath) - 1] = '\0'; // strip the trailing slash data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3244:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pakfile[ strlen( pakfile ) - 1 ] = 0; // strip the trailing slash data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3429:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). origpos += strlen(origpos); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3455:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(origpos) + (origpos - neededpaks) >= len - 1) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3748:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(pakBasename) == 7 && !Q_stricmpn( pakBasename, "sp_pak", 6 ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:3878:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). && strlen(pakBasename) == 4 && !Q_stricmpn( pakBasename, "pak", 3 ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4086:96: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (search->pack->referenced || Q_stricmpn(search->pack->pakGamename, com_basegame->string, strlen(com_basegame->string))) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/files.c:4153:96: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (search->pack->referenced || Q_stricmpn(search->pack->pakGamename, com_basegame->string, strlen(com_basegame->string))) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/json.h:221:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int nameLen = strlen(name); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:323:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/msg.c:349:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_chan.c:591:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). NET_SendPacket( sock, strlen( string ), string, adr ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1154:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ulen = strlen( net_socksUsername->string ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/net_ip.c:1155:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). plen = strlen( net_socksPassword->string ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:133:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inlen = strlen(in); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:134:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extlen = strlen(ext); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:171:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( out, in, strlen( in ) ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:782:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i, n = 0, len = strlen( str ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:938:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dest, src, destsize-1 ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1032:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen( dest ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1053:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(find); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1201:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( len = strlen( temp_buffer ) ) >= MAX_VA_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1252:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1319:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1414:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1450:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1472:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1508:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1551:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1565:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !value || !strlen( value ) ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1571:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1571:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1591:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1610:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1610:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/qcommon/q_shared.c:1632:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( set ); i++ ) data/iortcw-1.51.c+dfsg1/SP/code/qcommon/vm.c:282:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). chars = strlen( token ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2664:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2678:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2773:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). keyLength = strlen(keyname) + 1; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_bsp.c:2774:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tokenLength = strlen(com_token) + 1; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_fbo.c:84:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:441:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(shaderText); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:509:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:519:80: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(GLSL_CompileGPUShader(program->program, &program->vertexShader, vpCode, strlen(vpCode), GL_VERTEX_SHADER))) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:528:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!(GLSL_CompileGPUShader(program->program, &program->fragmentShader, fpCode, strlen(fpCode), GL_FRAGMENT_SHADER))) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:600:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). postHeader = &vpCode[strlen(vpCode)]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:601:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size -= strlen(vpCode); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:619:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). postHeader = &fpCode[strlen(fpCode)]; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_glsl.c:620:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size -= strlen(fpCode); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:2183:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3243:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_image.c:3274:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp( name + strlen( name ) - 5, ".skin" ) ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_init.c:1133:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int remainingLength = strlen(string); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:86:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 first data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:88:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC first data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC second data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:96:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 second data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:347:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:735:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(surf->name); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model.c:1276:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(surf->name); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:473:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). joint_names += strlen( (char *)header + header->ofs_text + data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:799:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( name ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_model_iqm.c:1672:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names += strlen( names ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shade_calc.c:361:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:2364:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). normalName[strlen(normalName) - 1] = '\0'; data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3608:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3642:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3672:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3952:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( textEnd, "\n" ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_shader.c:3953:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textEnd += strlen( textEnd ); data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:122:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/SP/code/rend2/tr_vbo.c:190:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(name) >= MAX_QPATH) data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:2095:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_bsp.c:2109:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( keyname, s, strlen( s ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1167:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1966:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_image.c:1997:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strcmp( name + strlen( name ) - 5, ".skin" ) ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_init.c:1037:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int remainingLength = strlen(string); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:86:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 first data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:88:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC first data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:94:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = 'c'; // try MDC second data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:96:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). namebuf[strlen( namebuf ) - 1] = '3'; // try MD3 second data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:115:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filename[strlen( filename ) - 1] = 'c'; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:366:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:996:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( surf->name ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model.c:1214:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen( surf->name ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model_iqm.c:470:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). joint_names += strlen( (char *)header + header->ofs_text + data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model_iqm.c:796:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen( name ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_model_iqm.c:1409:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). names += strlen( names ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shade_calc.c:350:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:2865:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:2899:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:2929:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) >= MAX_QPATH ) { data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:3209:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( textEnd, "\n" ); data/iortcw-1.51.c+dfsg1/SP/code/renderer/tr_shader.c:3210:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textEnd += strlen( textEnd ); data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:245:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( newModeString ) < (int)sizeof( buf ) - strlen( buf ) ) data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:245:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( newModeString ) < (int)sizeof( buf ) - strlen( buf ) ) data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:253:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[ strlen( buf ) - 1 ] = 0; data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:349:3: [1] (buffer) sscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. sscanf( version, "OpenGL %5s %d.%d", profile, &qglesMajorVersion, &qglesMinorVersion ); data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:1186:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (*glConfig.renderer_string && glConfig.renderer_string[strlen(glConfig.renderer_string) - 1] == '\n') data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:1187:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). glConfig.renderer_string[strlen(glConfig.renderer_string) - 1] = 0; data/iortcw-1.51.c+dfsg1/SP/code/sdl/sdl_glimp.c:1203:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extensionLength = strlen( extension ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:948:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). FS_Write(writebuf, strlen(writebuf), writeto); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1422:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = 39 - strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1462:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p[strlen( p ) - 1] = 0; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_ccmds.c:1502:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p[strlen(p)-1] = 0; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:405:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( ( strlen( ip ) + strlen( userinfo ) + 4 ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:405:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( ( strlen( ip ) + strlen( userinfo ) + 4 ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1385:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( val ) ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1398:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( val ) ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1400:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( i <= 0 || i > 100 || strlen( val ) > 4 ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1407:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(val)) data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1450:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) - strlen( val ) + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1450:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) - strlen( val ) + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1450:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) - strlen( val ) + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1452:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) + 4 + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_client.c:1452:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( ip ) + 4 + strlen( cl->userinfo ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:851:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( VMA(1), VMA(2), args[3] ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:1024:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( text && strlen( text ) ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_game.c:1025:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). textLen = strlen( text ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/server/sv_init.c:51:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(sv.configstrings[index]); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_init.c:366:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( cmd ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_init.c:923:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( p ) == 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:129:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !Q_strncmp( cmd, SV_GetReliableCommand( client, index ), strlen( "cs" ) ) ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:208:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen ((char *)message) > 1022 ) { data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:586:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(Cmd_Argv(1)) > 128) data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:604:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). playerLength = strlen( player ); data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:654:5: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(Cmd_Argv(1)) > 128) data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:744:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( sv_rconPassword->string ) || data/iortcw-1.51.c+dfsg1/SP/code/server/sv_main.c:772:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( sv_rconPassword->string ) ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_parse.cpp:339:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( *punc ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:107:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inlen = strlen(in); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:108:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extlen = strlen(ext); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:145:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_strncpyz( out, in, strlen( in ) ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:769:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 2; i < strlen( str ); i++ ) data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:919:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dest, src, destsize - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1001:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen( dest ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1022:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(find); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1170:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( ( len = strlen( temp_buffer ) ) >= MAX_VA_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1221:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( s ); data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1288:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1383:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1419:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1441:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1520:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1534:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !value || !strlen( value ) ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1540:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1540:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= MAX_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1560:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1579:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1579:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( newi ) + strlen( s ) >= BIG_INFO_STRING ) { data/iortcw-1.51.c+dfsg1/SP/code/splines/q_shared.cpp:1601:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( set ); i++ ) data/iortcw-1.51.c+dfsg1/SP/code/splines/splines.cpp:123:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qglCallLists( strlen( label ), GL_UNSIGNED_BYTE, label ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:237:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( str ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:367:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( m_data->data, olddata->data, len + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.cpp:450:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dst, buffer, size - 1 ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:181:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:253:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:267:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:281:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:310:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = length() + strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:406:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:429:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen( text ) < (unsigned) m_data->len ); data/iortcw-1.51.c+dfsg1/SP/code/splines/util_str.h:443:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_log.c:63:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int length = strlen( in ); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:126:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (i = strlen(TTY_CONSOLE_PROMPT); i > 0; i--) { data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:152:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = write(STDOUT_FILENO, TTY_CONSOLE_PROMPT, strlen(TTY_CONSOLE_PROMPT)); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:344:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). avail = read(STDIN_FILENO, &key, 1); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:400:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = write(STDOUT_FILENO, TTY_CONSOLE_PROMPT, strlen(TTY_CONSOLE_PROMPT)); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:411:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). avail = read(STDIN_FILENO, &key, 1); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:417:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). avail = read(STDIN_FILENO, &key, 1); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:483:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). len = read(STDIN_FILENO, text, sizeof(text)); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_tty.c:523:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (msg[strlen(msg) - 1] == '\n') { data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c:142:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qconsole_linelen = strlen( qconsole_line ); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c:175:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qconsole_linelen = strlen( qconsole_line ); data/iortcw-1.51.c+dfsg1/SP/code/sys/con_win32.c:419:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). qconsole_linelen = strlen( qconsole_line ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_main.c:153:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t bufsize = strlen( cliptext ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:370:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:388:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:457:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extLen = strlen( extension ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:476:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( d->d_name ) < extLen || data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:478:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). d->d_name + strlen( d->d_name ) - extLen, data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:567:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep( msec * 1000 ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:656:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( text ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_unix.c:971:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen( DLL_EXT ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:318:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( path ) - 1; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:329:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( base ) - 1; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:349:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( dir ) - 1; data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:368:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( ospath ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:443:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:458:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(subdirs)) { data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:489:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l0 = strlen(s0); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:490:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen(s1); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:556:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). extLen = strlen( extension ); data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:572:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( findinfo.name ) < extLen || data/iortcw-1.51.c+dfsg1/SP/code/sys/sys_win32.c:574:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). findinfo.name + strlen( findinfo.name ) - extLen, data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:237:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(BASEDIRNAME); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:238:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (c=path+strlen(path)-1 ; c != path ; c--) data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:256:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (qdir, path, c+len+count-path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:258:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( qdir ); i++ ) data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:269:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (gamedir, path, c+1-path); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:271:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( gamedir ); i++ ) data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:281:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ( writedir[strlen( writedir )-1] != '/' ) data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:283:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writedir[strlen( writedir )] = '/'; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:284:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writedir[strlen( writedir )+1] = 0; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:357:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). b = malloc(strlen(s)+1); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:400:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(out, "."); /* shrug */ data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:401:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (out, "\\"); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:404:6: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(out, "."); /* shrug */ data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:405:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (out, "/"); data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:816:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:845:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path)-1; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:855:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path)-1; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:878:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:894:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/cmdlib.c:913:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/iortcw-1.51.c+dfsg1/SP/code/tools/asm/q3asm.c:705:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(token, q, p - q); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_atoms.c:247:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( gameFile ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:100:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc( strlen( info ) + strlen( "\\num\\" ) + strlen( va( "%d", MAX_ARENAS ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:100:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc( strlen( info ) + strlen( "\\num\\" ) + strlen( va( "%d", MAX_ARENAS ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:100:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc( strlen( info ) + strlen( "\\num\\" ) + strlen( va( "%d", MAX_ARENAS ) ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:164:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_gameinfo.c:288:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:312:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:357:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:413:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:494:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( text ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1116:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). translateStrings[i].localname = (char *)trap_Alloc( strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1118:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). translateStrings[i].localname = (char *)malloc( strlen( token ) + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:1289:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( ui_savegameName.string ) || ui_savegameName.string[0] == '0' ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3615:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3619:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirptr += dirlen + strlen( descptr ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3811:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( sgname ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3878:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( moviename ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:3926:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(demoname); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4376:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4694:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( buff[0] != 32 && strlen( buff ) == CDKEY_LEN ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4774:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4792:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4957:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4957:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4977:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4989:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:4989:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( name ) > 0 && strlen( addr ) > 0 ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5293:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( uiInfo.serverStatus.motd ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5296:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( uiInfo.serverStatus.motd ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5453:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( serverStatusCvars[i].altName ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5557:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen( &info->pings[len] ) + 1; data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5628:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !strlen( uiInfo.findPlayerName ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5898:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( !translateStrings[i].name || !strlen( translateStrings[i].name ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:5903:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( translateStrings[i].localname && strlen( translateStrings[i].localname ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6690:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:6705:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filelen = strlen( fileptr ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7019:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( buf ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7180:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d GB", data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7180:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d GB", data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7184:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d MB", data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7184:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf + strlen( buf ), bufsize - strlen( buf ), ".%02d MB", data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_main.c:7766:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( ptr ) ) { data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_players.c:1096:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). text_p -= strlen( token ); // unget the token data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:343:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( p ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:2475:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( buff ); data/iortcw-1.51.c+dfsg1/SP/code/ui/ui_shared.c:3447:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( buff, start, p - start + 1 ); data/iortcw-1.51.c+dfsg1/SP/code/zlib-1.2.11/unzip.c:1260:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(szFileName)>=UNZ_MAXFILENAMEINZIP) ANALYSIS SUMMARY: Hits = 6454 Lines analyzed = 770663 in approximately 17.18 seconds (44870 lines/second) Physical Source Lines of Code (SLOC) = 500594 Hits@level = [0] 250 [1] 1497 [2] 3957 [3] 528 [4] 470 [5] 2 Hits@level+ = [0+] 6704 [1+] 6454 [2+] 4957 [3+] 1000 [4+] 472 [5+] 2 Hits/KSLOC@level+ = [0+] 13.3921 [1+] 12.8927 [2+] 9.90224 [3+] 1.99763 [4+] 0.94288 [5+] 0.00399525 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.