Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MouseInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/WorldViewInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameConfig.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Heartbeat.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/KeyboardInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Heartbeat.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BaseGameManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BaseGameManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BotGameManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConfigVariable.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapsManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/TileInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/WorldViewInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapsManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/BotGameManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PathScheduler.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerCommand.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/TileInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameConfig.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MouseInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConfigVariable.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PathScheduler.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/KeyboardInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Structs/TileSetStruct.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ShellWeapon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/MissleWeapon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ShellWeapon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/WeaponGlobals.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Weapon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Projectile.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/MissleWeapon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/WeaponGlobals.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Projectile.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ProjectileInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/Weapon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/BulletWeapon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/ProjectileInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Weapons/BulletWeapon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/GameViewGlobals.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SpecialButtonView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OrderingView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MainMenuView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/CreditsView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/RMouseHackView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SpecialButtonView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OrderingView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/IPAddressView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/ServerListView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/JoinView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/TipsView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/JoinView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/PlayerNameView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/TipsView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/GetSessionView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerQueryThread.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerList.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerInfo.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerList.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerInfo.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MasterServer/ServerQueryThread.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/GetSessionView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/PlayerNameView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/ServerListView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/IPAddressView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MainMenuView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SkirmishView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/HelpView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/HelpView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/CreditsView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/SkirmishView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/RMouseHackView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/GameViewGlobals.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollViewAlt.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameTemplateView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LoadingView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/DisconectedView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/ResignView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/DisconectedView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GFlagSelectionView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LoadingView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GFlagSelectionView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/ResignView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureExitView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureResignView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/MiniMapView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameTemplateView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureResignView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/MiniMapView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/AreYouSureExitView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/HelpScrollViewAlt.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ViewGlobals.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Component.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ScrollBar.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/MiniMap.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/MiniMap.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Button.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Label.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cButton.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Choice.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ScrollBar.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/newButton.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/CheckBox.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/MouseEvent.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/CheckBox.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InputEvent.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Button.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/newButton.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Choice.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Label.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cButton.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Component.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/StateChangedCallback.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/ViewGlobals.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Resources/ResourceManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Resources/ResourceManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathingState.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathingState.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TipOfDay.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Sprite.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WadMapTable.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ViewCamera.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldMap.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/UnitMessageTypes.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ViewCamera.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TipOfDay.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpawnList.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldMap.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/UnitNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientMessageRouter.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkServer.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/TerminalNetMesg.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerConnectDaemon.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacket.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketDebugger.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageEncoder.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientMessageRouter.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageEncoder.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/SystemNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerMessageRouter.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/GameControlNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerMessageRouter.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ObjectiveNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkServer.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkClient.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/PlayerNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkState.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageDecoder.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerConnectDaemon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageDecoder.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkReturnCodes.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkState.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketDebugger.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetTypes.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkClient.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/PowerUpNetMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpawnList.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/UnitMessage.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ScreenSurface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionList.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionBoxSprite.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerUnitConfig.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/ScreenSurface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerUnitConfig.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlacementMatrix.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpriteSorter.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Sprite.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlacementMatrix.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/OpcodeDebugger.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/OpcodeDebugger.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionList.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SpriteSorter.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/SelectionBoxSprite.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUp.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/EnemyRadarPowerUp.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/BonusUnitPowerUp.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUpInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUpInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/UnitPowerUp.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/UnitPowerUp.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/BonusUnitPowerUp.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/PowerUp.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/PowerUps/EnemyRadarPowerUp.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/Objective.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/ObjectiveInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/Objective.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/ObjectiveInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/NetworkGlobals.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/CoreTypes.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/NetworkGlobals.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Core/main.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/NetPanzerModule.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptManager.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptHelper.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptManager.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptHelper.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/Sound.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLEvents.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/DummySound.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/Sound.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLEvents.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLVideo.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLVideo.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLSound.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/DummySound.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLSound.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitLifecycles.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitProfileInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodes.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitState.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitGlobals.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBase.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeEncoder.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitState.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBucketArray.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitGlobals.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/Vehicle.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBlackBoard.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeDecoder.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitProfileInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeEncoder.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/Vehicle.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBucketArray.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitBlackBoard.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeDecoder.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitTypes.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CloudParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleTweakView.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Particle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateExplosionSystem.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TrajectoryParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/RadarPingParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlameParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateExplosionSystem.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TrajectoryParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystem2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlashParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Physics.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/MovementDirtPuffParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/WindParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlameParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CloudParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CraterParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmokingTrajectoryParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Physics.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystemGlobals.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/PuffParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/DirtKickParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/PuffParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/VectorPuffParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SparkParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/CraterParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/VectorPuffParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticleSystem2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateMuzzleSystem.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/RadarPingParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Particle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticleSystem2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmolderParticleSystem2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleTweakView.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmolderParticleSystem2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/TemplateMuzzleSystem.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystem2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticleSystem2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SparkParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticleSystem2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SmokingTrajectoryParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/SnowParticleSystem2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/DirtKickParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/GroundExplosionParticleSystem2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleSystemGlobals.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FlashParticle2D.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/WindParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/FireParticle2D.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotPlayer.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotTaskList.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/Bot.cpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotTask.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotTaskList.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/Bot.hpp Examining data/netpanzer-0.8.7+ds/src/NetPanzer/Bot/BotPlayer.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StreamTokenizer.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Timer.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/NTimer.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/FileStream.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/UtilInterface.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/BresenhamLine.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StringUtil.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimeStamp.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/UtilInterface.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Math.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Timer.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StringUtil.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Endian.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Math.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimeStamp.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/StringTokenizer.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimerInterface.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/NoCopy.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/BresenhamLine.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/TimerInterface.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/Log.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/option.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/option.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/command_line.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/optionmm/command_line.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iXY.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iXY.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fXYZ.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fRect.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iRect.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fXYZ.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fRect.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/Angle.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/Angle.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/iRect.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Types/fXY.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Section.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Store.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Section.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/INIParser/Store.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPListenSocket.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPSocket.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/Address.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkException.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketManager.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/Address.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketBase.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPListenSocket.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/UDPSocket.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/TCPSocket.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketSet.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketBase.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketHeaders.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/UDPSocket.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/Network/SocketManager.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BitArray.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/LinkListDoubleTemplate.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BoundBox.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BucketArrayTemplate.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BitArray.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/ArrayTemplate.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/QueueTemplate.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/ArrayUtil/BoundBox.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/RGBColor.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Color.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Color.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/DigitText.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/BuiltinFont.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/FontSystem2D.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Span.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/RGBColor.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Span.hpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/DigitText.cpp Examining data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp Examining data/netpanzer-0.8.7+ds/support/tools/bmp2pak.cpp Examining data/netpanzer-0.8.7+ds/support/tools/pak2bmp.cpp Examining data/netpanzer-0.8.7+ds/support/macosx/SDLMain.h FINAL RESULTS: data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:253:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/2080.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:256:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/4060.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:259:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/6040.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:262:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/8020.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:272:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/Brighten.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:276:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/DarkenALot.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:278:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/DarkenALittle.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:281:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s/LightDark.tbl", tablePath); data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp:31:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(message, 255, msg, args); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:42:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(writedir, "%s.%s", userdir, application); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:46:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(mkdir, ".%s", application); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:82:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(str, "%s%s%s", d, dirsep, *i); data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:155:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf(buf+timelen, sizeof(buf)-timelen-1, fmt, ap); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:427:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( str_buf, "MAP %s NOT FOUND!", game_setup->map_name ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:122:5: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. vsnprintf( temp_str, 256, format, vap ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:163:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( line_list[ line_index ].str, temp_str_ptr ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:272:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( inputPrompt, prompt ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:277:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( str, inputString ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:369:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(inputString, CommandList[commandPos].c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:79:32: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. __attribute__(( format(printf, 4, 5) )); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:217:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(chat_string_warning_k, "Server kicked '%s' due to noobiness!",player->getName().c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:247:21: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(chat_string_warning, "Warning '%s' - players with %i points or less get kicked!", player->getName().c_str(), GameConfig::game_lowscorelimit); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:558:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( str_buf, "MAP %s NOT FOUND!", map_name ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:39:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( map_path, file_path ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:41:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, file_path ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:46:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( tile_set_path, main_map.getAssocTileSet() ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:91:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, map_path ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:501:29: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(chat_string, "Server kicked '%s' due to inactivity",player->getName().c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/ObjectiveInterface.cpp:170:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(objective_obj->name, name.c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:178:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%sgroundChunks.pak", chunkPathPAK); data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:241:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%sgrayUnitChunks.pak", chunkPathPAK); data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:287:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%sgreenUnitChunks.pak", chunkPathPAK); data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:341:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%sburnGroundChunks.pak", chunkPathPAK); data/netpanzer-0.8.7+ds/src/NetPanzer/Scripts/ScriptManager.cpp:55:11: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(lua_toboolean(L, i) ? "true" : "false"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.cpp:52:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, sizeof(buf), data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.cpp:163:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s%s", title, subTitle); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:47:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cInputFieldString::string, string); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:91:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(excludedCharacters, other.excludedCharacters); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:115:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(excludedCharacters, other.excludedCharacters); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:194:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(excludedCharacters, exChars); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.cpp:177:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(statBuf, sizeof(statBuf), data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:308:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "Wind: %s (%d pix/sec)", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:314:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "Clouds: %s (%d allocated)", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.cpp:175:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(statBuf, sizeof(statBuf), data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:395:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "%s", getUnitName(vsvSelectedUnit)); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:554:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpostUserNameBuf, "Owner: %s...", strBuf); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:558:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpostUserNameBuf, "Owner: %s", obj->occupying_player->getName().c_str() ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:571:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpostNameBuf, "Outpost: %s...", strBuf); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:575:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(outpostNameBuf, "Outpost: %s", (const char *) obj->name ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:595:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(productionUnitBuf, "Production: %s", getUnitName(obj->unit_generation_type)); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.cpp:311:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(currentView, "%s", searchName); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/GetSessionView.cpp:168:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(currentMultiView, "%s", searchName); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.cpp:115:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(currentMultiView, "%s", searchName); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:266:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strBuf, "Name: %s", mapList[curMap]->name.c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Core/main.cpp:230:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(time(0)); data/netpanzer-0.8.7+ds/src/Lib/2D/BuiltinFont.cpp:21:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char staticFont[8192]= { data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:174:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(span + 1, &rowPtr[spanX1], spanLen * sizeof(PIX)); data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:368:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destRowPtr + x1, data, (srcMax.x-x1) * sizeof(PIX)); data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:373:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destRowPtr + x1, data, (x2-x1) * sizeof(PIX)); data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:400:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destRowPtr + ltoh16(span->x1), span + 1, data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:245:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tablePath[512]; data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:250:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[512]; data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:41:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char staticFont[8192]; data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:433:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dPtr, sPtr, pixelsPerRow * numRows * sizeof(PIX)); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:436:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dPtr, sPtr, pixelsPerRow * sizeof(PIX)); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:880:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dPtr, sPtr, getWidth() * sizeof(PIX)); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1301:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dptr,fptr,FONT_WIDTH); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1600:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.hpp:246:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, mem, std::min(frame_len, dest_len)); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.hpp:252:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mem, src, std::min(frame_len, src_len)); data/netpanzer-0.8.7+ds/src/Lib/Network/Address.cpp:152:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&result.ss, firstaddress->ai_addr, firstaddress->ai_addrlen); data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp:78:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&thread_work.ss, firstaddress->ai_addr, firstaddress->ai_addrlen); data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp:209:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&address.ss, &(*i).ss, (*i).ss_len); data/netpanzer-0.8.7+ds/src/Lib/Network/NetworkManager.cpp:232:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&address.ss, firstaddress->ai_addr, firstaddress->ai_addrlen); data/netpanzer-0.8.7+ds/src/Lib/Network/TCPSocket.cpp:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/netpanzer-0.8.7+ds/src/Lib/Network/UDPSocket.cpp:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4096]; data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp:41:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(message, other.message, len+1); data/netpanzer-0.8.7+ds/src/Lib/Util/FileStream.hpp:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileStream.hpp:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:172:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[fn_length]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:173:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fn, filename, fn_length); // includes \0; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:197:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fn_start, *curfile, fn_length-(folder_sep-fn)); data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048]; data/netpanzer-0.8.7+ds/src/Lib/Util/UtilInterface.cpp:38:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). port[0]=atoi(port_str.c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:147:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). assert(open.size() == 0); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:148:5: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open.push(best_node); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:273:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (!open.empty()) { data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:274:25: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). best_node = open.top(); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:275:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open.pop(); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.cpp:313:33: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open.push(node); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/Astar.hpp:115:46: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). AstarNodePtrCompare> open; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.hpp:139:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( PathList::list, rhs.list, sizeof( unsigned long ) * rhs.size ); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/AI/PathList.hpp:143:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( PathList::list, rhs.list, sizeof( unsigned long ) * rhs.size ); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:32:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netp_id_header[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[1024]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.hpp:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tile_set[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp:40:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char player_set[32]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message_text[150]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ChatNetMessage.hpp:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message_text[150]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:101:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:109:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( buf, "Protocol Version: %u", data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:184:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:239:24: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&upf.player_flag, cnupf, 280); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:419:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:453:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:459:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Data ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientConnectDaemon.cpp:467:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Data ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ClientMessageRouter.cpp:137:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pp.data, mmessage, msg_len); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pw[sizeof(this->password)]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp:56:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pw, this->password, sizeof(this->password)); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char password[32]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp:165:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char player_name[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.hpp:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map_name[32]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/GameControlNetMessage.hpp:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map_name[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageDecoder.cpp:43:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&decode_message, message, size); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetMessageEncoder.cpp:54:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(mlen+1, message, size); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.hpp:32:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&array[index], object, sizeof(NetPacket)); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetPacketQueues.hpp:39:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(object, &array[ front ], sizeof(NetPacket)); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkClient.cpp:115:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/NetworkInterface.cpp:36:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(TEMP_PACKET.data, data, size); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ServerMessageRouter.cpp:132:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(packet.data, mmessage, msg_len); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/SystemNetMessage.hpp:87:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char view_name[32]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:347:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:348:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, state->name, 64); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.hpp:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerUnitConfig.cpp:49:50: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num_units = n < (int)str_counts.size() ? atoi(str_counts[n].c_str()) : 0; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.cpp:540:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chat_string[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/WorldInputCmdProcessor.cpp:569:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chat_string[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.cpp:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message_text[MAX_CHAT_MSG_LEN]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ChatInterface.cpp:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message_text[MAX_CHAT_MSG_LEN]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp:111:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestamp[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp:128:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/Console.cpp:173:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestamp[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_str[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:348:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(inputString + cursorPos, inputString + cursorPos + 1, strlen(inputString + cursorPos + 1) + 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:358:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(inputString + cursorPos - 1, inputString + cursorPos, byteCount); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:63:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char inputString[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.hpp:64:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char inputPrompt[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:216:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chat_string_warning_k[140]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/DedicatedGameManager.cpp:246:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chat_string_warning[140]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:114:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:137:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:142:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:147:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:184:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:207:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:212:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:217:21: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:329:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:335:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( str_buf, "Loading Game Map ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.cpp:555:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str_buf[128]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/GameControlRulesDaemon.hpp:38:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char map_cycle_fsm_client_map_name[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.cpp:98:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). unsigned int flagnum = atoi(flagstr.c_str()); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/InfoSocket.cpp:166:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char flagdata[(sizeof(rawflag)*2) + 1]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/KeyboardInterface.hpp:47:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(previous_key_state, key_table, sizeof(key_table)); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tile_set_path[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:42:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, ".npm" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:45:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( tile_set_path, "wads/" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:80:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.cpp:93:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, ".spn" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/MapInterface.hpp:49:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char map_path[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:357:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strbuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:362:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( strbuf, "Loading Game Data ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:397:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( strbuf, "Loading Game Data ... (%d%%)", percent_complete); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerGameManager.cpp:500:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chat_string[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.cpp:186:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_str[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/PlayerInterface.cpp:198:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf( temp_str, "Player %u", player_id ); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp:127:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp:148:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+1, data, size); data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp:195:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempbuffer+tempoffset, data+dataptr, tocopy); data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.cpp:390:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tempbuffer+tempoffset, data+dataptr, tocopy); data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.hpp:83:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sendbuffer[SEND_BUFFER_LEN]; data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ClientSocket.hpp:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempbuffer[_MAX_NET_PACKET_SIZE]; data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:29:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char base64_chars[65]="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:31:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char auth_ptr_dest[5]; data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/netpanzer-0.8.7+ds/src/NetPanzer/Network/ProxyServer.cpp:93:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi(b)!=200) { data/netpanzer-0.8.7+ds/src/NetPanzer/Objectives/Objective.hpp:34:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:286:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ChunkTrajectoryParticle2D.cpp:340:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/Particle2D.cpp:44:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char particleArray[MAX_PARTICLES][MAX_PARTICLE_CLASS_SIZE]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp:520:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp:525:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "particleSystemCount: %d", ParticleSystem2D::getParticleSystemCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Particles/ParticleInterface.cpp:529:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "particleCount: %d", Particle2D::getFrameCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pyro_id_header[64]; // file text identification; data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map_name[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Port/MapData.hpp:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tile_dbase_name[64]; // tile_dbase to use with map data/netpanzer-0.8.7+ds/src/NetPanzer/Resources/ResourceManager.cpp:59:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char flagUsedCount[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Structs/TileSetStruct.hpp:34:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char netp_id_header[64]; data/netpanzer-0.8.7+ds/src/NetPanzer/Structs/TileSetStruct.hpp:39:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char palette[768]; data/netpanzer-0.8.7+ds/src/NetPanzer/System/SDLVideo.cpp:227:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeDecoder.cpp:48:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&opcode_message, message, size); data/netpanzer-0.8.7+ds/src/NetPanzer/Units/UnitOpcodeEncoder.cpp:50:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(opcode_message.data + opcode_index, opcode, opcode->getSize()); data/netpanzer-0.8.7+ds/src/NetPanzer/Units/Vehicle.cpp:1924:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&pending_AI_comm_mesg, command_mesg, sizeof(UMesgAICommand)); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp:635:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp:641:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "STATUS_VISIBLE"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/Desktop.cpp:644:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "INVISIBLE"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/InfoBar.cpp:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/View.cpp:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:285:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destString + cursorPos, destString + cursorPos + 1, strlen(destString + cursorPos + 1) + 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:295:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destString + cursorPos - 1, destString + cursorPos, byteCount); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:139:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Packets" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:145:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Sent %ld, %.4f 1/s, %.4f Avg", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:154:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Recv %ld, %.4f 1/s, %.4f Avg", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:162:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Bytes" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:167:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Sent %ld, %.4f 1/s, %.4f Avg", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:175:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Recv %ld, %.4f 1/s, %.4f Avg", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:183:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Opcodes" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:188:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Sent : %ld, %.4f 1/s ", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:195:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Recv : %ld, %.4f 1/s", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:203:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Ping Time: %.4f (ms)", NetworkState::ping_time ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:205:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Ping Time: NA" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:220:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Sorter" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:226:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Level %lu : %lu ", i, SPRITE_SORTER.getMaxSprites( i ) ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:237:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:241:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Pathing" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:246:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "A* Time: %.6f s", PathingState::astar_gen_time ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:251:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "A* Avg: %.6f s", PathingState::getAverageAstarPathTime() ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:256:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "A* Total: %.6f s", PathingState::astar_gen_time_total ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:262:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Path Length: %ld ", PathingState::path_length ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:268:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Paths: %lu ", PathingState::path_gen_count ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:273:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Updates: %lu ", PathingState::update_gen_count ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:278:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Cache Hits: %lu ", PathingState::path_cache_hits ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:283:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Cache Misses: %lu ", PathingState::path_cache_misses ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:291:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:298:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Units" ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:311:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Player %d : %lu ", i, units); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/CodeStatsView.cpp:316:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "UnitTotal : %d", total ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/DisconectedView.cpp:40:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(MenuTemplateView::currentMultiView, "GetSessionView"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/EndRoundView.cpp:134:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GFlagSelectionView.cpp:67:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(upf.player_flag, data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/GameView.cpp:209:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(destptr,tileptr,columns); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:169:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Alive Count: %d", Surface::getTotalSurfaceCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:173:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Mem: %d b, %d k, %3.2f MG", Surface::getTotalByteCount(), Surface::getTotalByteCount() / 1024, float(Surface::getTotalByteCount()) / 1024.0f / 1024.0f); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:180:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Alive Count: %d", PackedSurface::getTotalSurfaceCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:184:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Draw Count: %d", PackedSurface::totalDrawCount); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:188:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Mem: %d b, %d k, %3.2f MG", PackedSurface::getTotalByteCount(), PackedSurface::getTotalByteCount() / 1024, float(PackedSurface::getTotalByteCount()) / 1024.0f / 1024.0f); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:195:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Count: %d", ColorTable::getTotalColorArrayCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:199:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Mem: %d b, %d k, %3.2f MG", ColorTable::getTotalByteCount(), ColorTable::getTotalByteCount() / 1024, float(ColorTable::getTotalByteCount()) / 1024.0f / 1024.0f); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:210:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:218:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Particle Systems: %d", ParticleSystem2D::getParticleSystemCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:222:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Particles: %d", Particle2D::getFrameCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:229:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Particle Systems: %d", ParticleSystem2D::getPeakParticleSystemCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:233:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Particles: %d", Particle2D::getPeakCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:246:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Cache Miss: %d (%%%2.2f)", int(missCount), 100.0f * (missCount / (hitCount + missCount))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:250:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Cache Hit: %d (%%%2.2f)", int(hitCount), 100.0f * (hitCount / (hitCount + missCount))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:260:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Explosion Flame Flash Miss:%d (%%%2.2f)", int(missCount), 100.0f * (missCount / (hitCount + missCount))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:264:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Explosion Flame Flash Hit: %d (%%%2.2f)", int(hitCount), 100.0f * (hitCount / (hitCount + missCount))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:271:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Muzzle System Miss: %d (%%%2.2f)", int(missCount), 100.0f * (missCount / (hitCount + missCount))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:275:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Muzzle System Hit: %d (%%%2.2f)", int(hitCount), 100.0f * (hitCount / (hitCount + missCount))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/LibView.cpp:302:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/RankView.cpp:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char statBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:310:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:399:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%01d:%02d/%01d:%02d", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:408:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "power off"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:412:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "power off"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:418:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d/%d", int(UnitInterface::getUnitCount(PlayerInterface::getLocalPlayerIndex())), unitPerPlayer); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:500:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:517:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outpostNameBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:519:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outpostUserNameBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:520:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char productionUnitBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:521:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeLeftBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:599:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(timeLeftBuf, "Time Left: %01d:%02d", data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.hpp:61:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char currentMultiView[256]; // Used to keep track of where you are in the multiplayer menus. data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/MenuTemplateView.hpp:62:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char currentView[256]; // Used to keep track of which menu you are currently in. data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.hpp:40:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char gameTypeBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:439:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:452:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d", getCurMaxPlayersCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:460:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d - %d max per player", getCurMaxUnitCount(), getCurMaxUnitCount() / getCurMaxPlayersCount()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:495:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d%% - %d of %d", getObjectiveCapturePercent(), data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:499:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Map Data Needed"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:507:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d:%d", getTimeLimitHours(), getTimeLimitMinutes() ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostOptionsView.cpp:514:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d Frags", getFragLimit() ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostView.cpp:36:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(HostView::gameTypeBuf, "Objective"); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:259:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:272:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Size: %d x %d", sizeX, sizeY); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:276:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "Objectives: %d", mapList[curMap]->objectiveCount); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/ServerListView.cpp:166:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ssn[44]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.cpp:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitColorView.cpp:136:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%1.3f of %1.3f", grayPercent, maxPercent); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.cpp:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/UnitSelectionView.cpp:56:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d", scrollBar->getValue()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:188:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res_str[20]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:321:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char strBuf[256]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:329:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d %%", int((float(getScrollRate()) / 10000.0f * 100.0f))); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:338:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d %%", getSoundVolume()); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/OptionsTemplateView.cpp:346:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(strBuf, "%d %%", getMusicVolume()); data/netpanzer-0.8.7+ds/support/tools/bmp2pak.cpp:110:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(filesystem::getRealWriteName(filename.c_str()).c_str(), "r"); data/netpanzer-0.8.7+ds/support/tools/pak2bmp.cpp:132:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *f = fopen(filesystem::getRealWriteName(deffile.str().c_str()).c_str(), "w"); data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.cpp:292:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(&checkcolor, sizeof(Uint8), 3); data/netpanzer-0.8.7+ds/src/Lib/2D/ColorTable.cpp:296:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(colorArray, colorCount, 1); data/netpanzer-0.8.7+ds/src/Lib/2D/PackedSurface.cpp:239:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(packedDataChunk, rowOffsetTable[pix.y*frameCount], 1); data/netpanzer-0.8.7+ds/src/Lib/2D/Palette.cpp:299:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(&color[i], 3, 1); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1316:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ascii8x8.getWidth() * strlen(text); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1336:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(str); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1419:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bltString( (getWidth() - (strlen(string) * ascii8x8.getWidth())) / 2, data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1427:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bltString( (getWidth() - (strlen(string) * ascii8x8.getWidth())) / 2, data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1440:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bltStringShadowed((getWidth() - (strlen(string) * ascii8x8.getWidth())) / 2, data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1452:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(string); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1526:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(mem, getWidth() * getHeight(), 1); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1536:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(mem, getWidth(), 1); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1537:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(buffer, padding, 1); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1583:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int totalLength = strlen(string); data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1617:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int) (pos.x + strlen(strBuf) * ascii8x8.getWidth()) > rect.max.x) { data/netpanzer-0.8.7+ds/src/Lib/2D/Surface.cpp:1628:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pos.x += strlen(strBuf) * ascii8x8.getWidth(); data/netpanzer-0.8.7+ds/src/Lib/Util/Exception.cpp:39:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(other.message); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:40:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* writedir = new char[strlen(userdir) + strlen(application) + 2]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:40:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* writedir = new char[strlen(userdir) + strlen(application) + 2]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:45:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* mkdir = new char[strlen(application)+2]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:71:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t extlen = strlen(archiveExt); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:75:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t l = strlen(*i); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:81:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* str = new char[strlen(d) + strlen(dirsep) + l + 1]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:81:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* str = new char[strlen(d) + strlen(dirsep) + l + 1]; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:171:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int fn_length = strlen(filename)+1; data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:319:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). void ReadFile::read(void* buffer, size_t objsize, size_t objcount) data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.cpp:347:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(ptr, size, maxnum); data/netpanzer-0.8.7+ds/src/Lib/Util/FileSystem.hpp:62:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). void read(void* buffer, size_t objsize, size_t objcount); data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:156:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buf, "\n"); data/netpanzer-0.8.7+ds/src/Lib/Util/Log.cpp:164:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int blen = strlen(buf); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:26:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file.read(&netp_id_header, sizeof(netp_id_header), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:28:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file.read(&name, sizeof(name), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:29:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file.read(&description, sizeof(description), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/MapFile.cpp:32:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file.read(&tile_set, sizeof(tile_set), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/Network/ConnectNetMessage.cpp:99:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ConnectClientSettings::player_name, player_name, 64); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:319:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(state.name, name.c_str(), sizeof(state.name)-1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/PlayerState.cpp:335:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(state.name, name.c_str(), sizeof(state.name)-1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:47:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file.read(&dbHeader->netp_id_header, sizeof(dbHeader->netp_id_header), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:52:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file.read(&dbHeader->palette, sizeof(dbHeader->palette), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:103:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(tile_info, tile_set_info.tile_count, sizeof(TILE_HEADER)); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:104:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read( tile_data, tile_buffer_size, 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:147:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read( (tile_info + mapped_index), sizeof(TILE_HEADER), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:184:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read( (tile_data + (mapped_index*tile_size)), data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:229:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read((tile_info + mapped_index), sizeof ( TILE_HEADER ), 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:274:37: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). partition_load_fhandle->read((tile_info + mapped_index), sizeof ( TILE_HEADER ), 1 ); data/netpanzer-0.8.7+ds/src/NetPanzer/Classes/TileSet.cpp:311:37: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). partition_load_fhandle->read((tile_data + (partition_load_mapped_index*tile_size)), tile_size, 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:132:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp_str_length = (long) strlen(temp_str); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:144:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( line_list[ line_index ].str, temp_str_ptr, max_char_per_line); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:241:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). input_offset.x = current_line.x + ( (long) strlen( inputPrompt ) ) * CHAR_XPIX; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:245:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). input_string_length = strlen(inputString); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:284:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(inputString) + 1; data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:320:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(inputString); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:332:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursorPos = strlen(inputString); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:344:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (cursorPos == (int) strlen(inputString + cursorPos)) { data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:348:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(inputString + cursorPos, inputString + cursorPos + 1, strlen(inputString + cursorPos + 1) + 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:354:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int byteCount = strlen(inputString + cursorPos); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ConsoleInterface.cpp:372:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursorPos = strlen(inputString); data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp:74:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(size_t a = 0; a < 12-strlen(commands[i].name); ++a) data/netpanzer-0.8.7+ds/src/NetPanzer/Interfaces/ServerConsole.cpp:132:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf)-1] = '\0'; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:46:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(string) > 0 && strlen(string) < (size_t) maxCharCount) { data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:46:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(string) > 0 && strlen(string) < (size_t) maxCharCount) { data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:59:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(this->string, string.c_str(), maxCharCount); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:90:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). excludedCharacters = new char[strlen(other.excludedCharacters)+1]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:114:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). excludedCharacters = new char[strlen(other.excludedCharacters) +1]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:189:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). excludedCharacters = new char [strlen(exChars) + 1]; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:256:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(destString); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:267:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursorPos = strlen(destString); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:281:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (cursorPos == strlen(destString)) { data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:285:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(destString + cursorPos, destString + cursorPos + 1, strlen(destString + cursorPos + 1) + 1); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:291:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int byteCount = strlen(destString + cursorPos); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:369:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (cursorPos > strlen(destString)) { data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Components/cInputField.cpp:370:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cursorPos = strlen(destString); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:212:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). productionUnitPos.x = (strlen("Current Unit:") + 1) * CHAR_XPIX + 2; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:218:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). timeRequiredPos.x = (strlen("Time: ") + 1) * CHAR_XPIX + 2; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:224:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unitsBuiltPos.x = (strlen("Time: ") + 1) * CHAR_XPIX + 2; data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:549:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( obj->occupying_player->getName().c_str() ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:552:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strBuf, obj->occupying_player->getName().c_str() , 10); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:566:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( obj->name ); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/Game/VehicleSelectionView.cpp:569:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(strBuf, (const char *) obj->name , 7); data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/HostJoinTemplateView.cpp:60:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(HostJoinTemplateView::gameTypeBuf) == 0) { data/netpanzer-0.8.7+ds/src/NetPanzer/Views/MainMenu/Multi/MapSelectionView.cpp:220:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). file->read(mapinfo->thumbnail.getFrame0(), numBytes, 1); ANALYSIS SUMMARY: Hits = 381 Lines analyzed = 70098 in approximately 1.58 seconds (44365 lines/second) Physical Source Lines of Code (SLOC) = 45221 Hits@level = [0] 69 [1] 81 [2] 245 [3] 1 [4] 54 [5] 0 Hits@level+ = [0+] 450 [1+] 381 [2+] 300 [3+] 55 [4+] 54 [5+] 0 Hits/KSLOC@level+ = [0+] 9.95113 [1+] 8.42529 [2+] 6.63409 [3+] 1.21625 [4+] 1.19414 [5+] 0 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.