Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h Examining data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c Examining data/openarena-0.8.8+dfsg/code/tools/asm/mathlib.h Examining data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c Examining data/openarena-0.8.8+dfsg/code/tools/asm/opstrings.h Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_kick.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_display.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_rankings.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_playersettings.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_timelimit.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_main.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_spreset.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_removebots.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_sound.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_network.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_custom.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_confirm.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_map.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_fraglimit.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_password.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_loadconfig.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_challenges.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_signup.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_demo2.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_login.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_cinematics.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_addbots.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_spskill.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_saveconfig.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_team.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyserver.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_sparena.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_options.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_gametype.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_credits.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_cdkey.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_setup.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_ingame.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_firstconnect.c Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_local.h Examining data/openarena-0.8.8+dfsg/code/q3_ui/ui_preferences.c Examining data/openarena-0.8.8+dfsg/code/renderer/tr_types.h Examining data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h Examining data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h Examining data/openarena-0.8.8+dfsg/code/qcommon/q_math.c Examining data/openarena-0.8.8+dfsg/code/qcommon/surfaceflags.h Examining data/openarena-0.8.8+dfsg/code/qcommon/q_platform.h Examining data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h Examining data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c Examining data/openarena-0.8.8+dfsg/code/game/g_client.c Examining data/openarena-0.8.8+dfsg/code/game/bg_alloc.c Examining data/openarena-0.8.8+dfsg/code/game/g_syscalls.c Examining data/openarena-0.8.8+dfsg/code/game/g_local.h Examining data/openarena-0.8.8+dfsg/code/game/ai_cmd.c Examining data/openarena-0.8.8+dfsg/code/game/syn.h Examining data/openarena-0.8.8+dfsg/code/game/g_arenas.c Examining data/openarena-0.8.8+dfsg/code/game/ai_cmd.h Examining data/openarena-0.8.8+dfsg/code/game/g_rankings.c Examining data/openarena-0.8.8+dfsg/code/game/g_mem.c Examining data/openarena-0.8.8+dfsg/code/game/g_rankings.h Examining data/openarena-0.8.8+dfsg/code/game/g_public.h Examining data/openarena-0.8.8+dfsg/code/game/g_bot.c Examining data/openarena-0.8.8+dfsg/code/game/g_weapon.c Examining data/openarena-0.8.8+dfsg/code/game/g_misc.c Examining data/openarena-0.8.8+dfsg/code/game/chars.h Examining data/openarena-0.8.8+dfsg/code/game/bg_local.h Examining data/openarena-0.8.8+dfsg/code/game/ai_dmq3.h Examining data/openarena-0.8.8+dfsg/code/game/g_vote.c Examining data/openarena-0.8.8+dfsg/code/game/g_team.c Examining data/openarena-0.8.8+dfsg/code/game/ai_main.c Examining data/openarena-0.8.8+dfsg/code/game/g_spawn.c Examining data/openarena-0.8.8+dfsg/code/game/bg_slidemove.c Examining data/openarena-0.8.8+dfsg/code/game/g_killspree.c Examining data/openarena-0.8.8+dfsg/code/game/g_team.h Examining data/openarena-0.8.8+dfsg/code/game/ai_main.h Examining data/openarena-0.8.8+dfsg/code/game/g_killspree.h Examining data/openarena-0.8.8+dfsg/code/game/g_svcmds.c Examining data/openarena-0.8.8+dfsg/code/game/challenges.h Examining data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c Examining data/openarena-0.8.8+dfsg/code/game/g_playerstore.c Examining data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c Examining data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c Examining data/openarena-0.8.8+dfsg/code/game/ai_dmnet.h Examining data/openarena-0.8.8+dfsg/code/game/g_session.c Examining data/openarena-0.8.8+dfsg/code/game/g_unlagged.c Examining data/openarena-0.8.8+dfsg/code/game/g_target.c Examining data/openarena-0.8.8+dfsg/code/game/g_mover.c Examining data/openarena-0.8.8+dfsg/code/game/g_admin.c Examining data/openarena-0.8.8+dfsg/code/game/ai_team.c Examining data/openarena-0.8.8+dfsg/code/game/match.h Examining data/openarena-0.8.8+dfsg/code/game/inv.h Examining data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c Examining data/openarena-0.8.8+dfsg/code/game/g_admin.h Examining data/openarena-0.8.8+dfsg/code/game/ai_team.h Examining data/openarena-0.8.8+dfsg/code/game/g_utils.c Examining data/openarena-0.8.8+dfsg/code/game/ai_vcmd.h Examining data/openarena-0.8.8+dfsg/code/game/g_fileops.c Examining data/openarena-0.8.8+dfsg/code/game/g_trigger.c Examining data/openarena-0.8.8+dfsg/code/game/g_missile.c Examining data/openarena-0.8.8+dfsg/code/game/bg_lib.c Examining data/openarena-0.8.8+dfsg/code/game/bg_lib.h Examining data/openarena-0.8.8+dfsg/code/game/ai_chat.c Examining data/openarena-0.8.8+dfsg/code/game/ai_chat.h Examining data/openarena-0.8.8+dfsg/code/game/g_cmds.c Examining data/openarena-0.8.8+dfsg/code/game/g_main.c Examining data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c Examining data/openarena-0.8.8+dfsg/code/game/bg_misc.c Examining data/openarena-0.8.8+dfsg/code/game/bg_pmove.c Examining data/openarena-0.8.8+dfsg/code/game/bg_public.h Examining data/openarena-0.8.8+dfsg/code/game/g_active.c Examining data/openarena-0.8.8+dfsg/code/game/g_combat.c Examining data/openarena-0.8.8+dfsg/code/game/g_items.c Examining data/openarena-0.8.8+dfsg/code/botlib/l_libvar.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ea.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_char.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_chat.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_struct.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_move.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_goal.h Examining data/openarena-0.8.8+dfsg/code/botlib/aasfile.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_interface.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_funcs.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_file.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_weap.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_bsp.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_main.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_script.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_gen.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_routealt.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_optimize.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_log.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_entity.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_weight.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_utils.h Examining data/openarena-0.8.8+dfsg/code/botlib/botlib.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_cluster.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_sample.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_reach.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_debug.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_precomp.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_crc.h Examining data/openarena-0.8.8+dfsg/code/botlib/l_memory.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_ai_move.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_def.h Examining data/openarena-0.8.8+dfsg/code/botlib/be_aas_route.h Examining data/openarena-0.8.8+dfsg/code/cgame/cg_playerstate.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_unlagged.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_predict.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_info.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_syscalls.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_local.h Examining data/openarena-0.8.8+dfsg/code/cgame/cg_snapshot.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_challenges.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_ents.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_view.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_drawtools.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_players.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_effects.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_event.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_public.h Examining data/openarena-0.8.8+dfsg/code/cgame/cg_scoreboard.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_main.c Examining data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_public.h Examining data/openarena-0.8.8+dfsg/code/ui/ui_main.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_shared.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_shared.h Examining data/openarena-0.8.8+dfsg/code/ui/ui_syscalls.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_players.c Examining data/openarena-0.8.8+dfsg/code/ui/ui_local.h Examining data/openarena-0.8.8+dfsg/code/client/keycodes.h Examining data/openarena-0.8.8+dfsg/ui/menudef.h FINAL RESULTS: data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:645:2: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(fn, filename, sizeof(fn)-1); data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:115:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( targetName, S_COLOR_WHITE ); data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:245:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( attackerName, S_COLOR_WHITE ); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:792:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, wp->name); data/openarena-0.8.8+dfsg/code/game/ai_main.c:291:33: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (BotTeam(bs) == TEAM_RED) strcpy(flagstatus, S_COLOR_RED"F "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:292:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(flagstatus, S_COLOR_BLUE"F "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:297:33: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). if (BotTeam(bs) == TEAM_RED) strcpy(flagstatus, S_COLOR_RED"F "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:298:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). else strcpy(flagstatus, S_COLOR_BLUE"F "); data/openarena-0.8.8+dfsg/code/game/ai_team.c:240:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ctftaskpreferences[teammate].name, teammatename); data/openarena-0.8.8+dfsg/code/game/bg_lib.c:198:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat( char *strDestination, const char *strSource ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.c:212:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy( char *strDestination, const char *strSource ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.c:2102:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf( const char *buffer, const char *fmt, ... ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.h:87:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). char *strcat( char *strDestination, const char *strSource ); data/openarena-0.8.8+dfsg/code/game/bg_lib.h:88:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). char *strcpy( char *strDestination, const char *strSource ); data/openarena-0.8.8+dfsg/code/game/bg_lib.h:105:93: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int Q_snprintf( char *buffer, size_t length, const char *fmt, ... ) __attribute__ ((format (printf, 3, 4))); data/openarena-0.8.8+dfsg/code/game/bg_lib.h:107:5: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int sscanf( const char *buffer, const char *fmt, ... ) __attribute__ ((format (scanf, 2, 3))); data/openarena-0.8.8+dfsg/code/game/bg_lib.h:107:80: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. int sscanf( const char *buffer, const char *fmt, ... ) __attribute__ ((format (scanf, 2, 3))); data/openarena-0.8.8+dfsg/code/game/g_arenas.c:133:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( msg, buf ); data/openarena-0.8.8+dfsg/code/game/g_bot.c:116:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(infos[count], info); data/openarena-0.8.8+dfsg/code/game/g_bot.c:181:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, dirptr); data/openarena-0.8.8+dfsg/code/game/g_bot.c:784:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name, Info_ValueForKey( g_botInfos[i], "name" )); data/openarena-0.8.8+dfsg/code/game/g_bot.c:788:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(funname, Info_ValueForKey( g_botInfos[i], "funname" )); data/openarena-0.8.8+dfsg/code/game/g_bot.c:792:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, Info_ValueForKey( g_botInfos[i], "model" )); data/openarena-0.8.8+dfsg/code/game/g_bot.c:796:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(aifile, Info_ValueForKey( g_botInfos[i], "aifile")); data/openarena-0.8.8+dfsg/code/game/g_bot.c:925:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, dirptr); data/openarena-0.8.8+dfsg/code/game/g_client.c:1360:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(c1, Info_ValueForKey( userinfo, "color1" )); data/openarena-0.8.8+dfsg/code/game/g_client.c:1361:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(c2, Info_ValueForKey( userinfo, "color2" )); data/openarena-0.8.8+dfsg/code/game/g_client.c:1364:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(redTeam, Info_ValueForKey( userinfo, "g_redteam" )); data/openarena-0.8.8+dfsg/code/game/g_client.c:1365:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(blueTeam, Info_ValueForKey( userinfo, "g_blueteam" )); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:101:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string + stringlength, entry); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:159:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string + stringlength, entry); data/openarena-0.8.8+dfsg/code/game/g_team.c:1750:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (string + stringlength, entry); data/openarena-0.8.8+dfsg/code/game/g_utils.c:44:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(remappedShaders[i].newShader,newShader); data/openarena-0.8.8+dfsg/code/game/g_utils.c:50:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(remappedShaders[remapCount].newShader,newShader); data/openarena-0.8.8+dfsg/code/game/g_utils.c:51:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(remappedShaders[remapCount].oldShader,oldShader); data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:742:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( name, name2 ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:803:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s_controls.playerModel, buf ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:128:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(infos[count], info); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:196:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, dirptr); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:383:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, dirptr); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:340:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s_playermodel.modelskin,pdest + 5); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:486:4: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(modelskin,pdest + 5); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:91:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, item->world_model[0] ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:97:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, item->world_model[0] ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playersettings.c:261:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s_playersettings.playerModel, buf ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:146:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buff,t->generic.name); data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:150:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buff,t->string); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:968:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( g_arenaservers.favoriteaddresses[g_numfavoriteservers], adrstr ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1157:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( adrstr, g_arenaservers.favoriteaddresses[g_arenaservers.currentping] ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1162:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( g_arenaservers.pinglist[j].adrstr, adrstr ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyserver.c:81:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buff,s_specifyserver.domain.field.buffer); data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:237:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( levelMenuInfo.levelPicNames[n], va( "levelshots/%s.tga", map ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:239:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( levelMenuInfo.levelPicNames[n], ART_MAP_UNKNOWN ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1499:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( s_serveroptions.mapnamebuffer, s_startserver.mapname.string ); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1221:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (start, s); // remove this part data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1288:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (newi, s); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1289:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (s, newi); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1328:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (s, newi); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:135:22: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_snprintf _snprintf data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:137:23: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_vsnprintf vsnprintf data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:138:22: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define Q_snprintf snprintf data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:641:66: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseError( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:642:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void COM_ParseWarning( char *format, ... ) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:676:93: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_sprintf (char *dest, int size, const char *fmt, ...) __attribute__ ((format (printf, 3, 4))); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:780:60: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. char * QDECL va(char *format, ...) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:799:83: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int level, const char *error, ... ) __attribute__ ((format (printf, 2, 3))) __attribute__((noreturn)); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:800:71: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *msg, ... ) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:166:117: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL NET_OutOfBandPrint( netsrc_t net_socket, netadr_t adr, const char *format, ...) __attribute__ ((format (printf, 3, 4))); data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:648:87: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL FS_Printf( fileHandle_t f, const char *fmt, ... ) __attribute__ ((format (printf, 2, 3))); data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:773:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Printf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:774:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_DPrintf( const char *fmt, ... ) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:775:82: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Com_Error( int code, const char *fmt, ... ) __attribute__ ((format (printf, 2, 3))); data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:1020:71: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. void QDECL Sys_Error( const char *error, ...) __attribute__ ((format (printf, 1, 2))); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:91:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (filename, "%s%s", filebase, fileinfo.name); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:126:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (text, error,argptr); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:129:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (text2, "%s\nGetLastError() = %i", text, err); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:150:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (error,argptr); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:167:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf (format,argptr); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:185:2: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. vsprintf (text, format, argptr); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:188:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(text); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:231:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (temp, path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:280:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( writedir, gamedir ); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:305:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (full, path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:308:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (full, path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:318:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( full, path ); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:321:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (full, "%s%s", qdir, path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:331:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( full, path ); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:334:2: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (full, "%s%s", gamedir, path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:347:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf (archivename, "%s/%s", archivedir, path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:358:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (b, s); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:823:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (path, extension); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:833:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (temp,path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:834:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (path,basepath); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:835:2: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat (path,temp); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:924:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (dest,src); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:233:10: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vprintf(fmt, vp); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:495:2: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf( fmt,argptr ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:547:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( expanded, "%s_%i", sym, currentFileIndex ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:603:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf( expanded, "%s_%i", sym, currentFileIndex ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:925:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, token ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1070:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( name, token ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1319:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( imageName, outputFilename ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1353:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( imageName, outputFilename ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1432:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( filename, asmFileNames[ i ] ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1495:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( expanded, filename ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1509:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( outputFilename, com_token ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1568:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( outputFilename, argv[ i+1 ] ); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:95:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(infos[count], info); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:162:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, dirptr); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:285:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, dirptr); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:999:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(lastName, menu->window.name); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1290:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, UI_Cvar_VariableString("model")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1291:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(head, UI_Cvar_VariableString("headmodel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1299:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(team, UI_Cvar_VariableString("ui_teamName")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1300:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, UI_Cvar_VariableString("team_model")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1301:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(head, UI_Cvar_VariableString("team_headmodel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1332:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, UI_Cvar_VariableString("model")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1333:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(head, UI_Cvar_VariableString("headmodel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1341:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(team, UI_Cvar_VariableString("ui_teamName")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1342:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, UI_Cvar_VariableString("team_model")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1343:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(head, UI_Cvar_VariableString("team_headmodel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1543:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, UI_Cvar_VariableString("ui_opponentModel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1544:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(headmodel, UI_Cvar_VariableString("ui_opponentModel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1572:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(model, UI_Cvar_VariableString("ui_opponentModel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1573:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(headmodel, UI_Cvar_VariableString("ui_opponentModel")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3565:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buff, orders); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3574:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buff, orders); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3602:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buff, orders); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5604:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(text, va("Connecting to %s", cstate.servername)); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:92:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, item->world_model[0] ); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:98:2: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy( path, item->world_model[0] ); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:190:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&strPool[strPoolIndex], p); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3370:6: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat( g_nameBind1, g_nameBind2 ); data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:464:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:471:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/openarena-0.8.8+dfsg/code/cgame/cg_effects.c:64:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = cg.time + 1000 + random() * 250; data/openarena-0.8.8+dfsg/code/cgame/cg_effects.c:634:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 5000 + random() * 3000; data/openarena-0.8.8+dfsg/code/cgame/cg_effects.c:761:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + 10000 + random() * 6000; data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c:197:81: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.bloodMarkShader, trace->endpos, trace->plane.normal, random()*360, data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c:202:80: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.burnMarkShader, trace->endpos, trace->plane.normal, random()*360, data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c:286:77: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( cgs.media.lbldShader2, trace->endpos, trace->plane.normal, random()*360, data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c:839:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->angles.trBase[0] = random() * 360; data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c:840:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->angles.trBase[1] = random() * 360; data/openarena-0.8.8+dfsg/code/cgame/cg_localents.c:841:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->angles.trBase[2] = random() * 360; data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:1987:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rndSize = 0.4 + random()*0.6; data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:2217:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p->vel[2] = random()*20; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:299:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:306:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. cg.headEndTime = cg.time + 100 + random() * 2000; data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:1729:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rndSize = 0.4 + random()*0.6; data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:1959:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. p->vel[2] = random()*20; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:907:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() * voiceChatList->voiceChats[i].numSounds; data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:52:86: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + cg_brassTime.integer + ( cg_brassTime.integer / 4 ) * random(); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:133:81: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. le->endTime = le->startTime + cg_brassTime.integer*3 + cg_brassTime.integer * random(); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:3123:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( mark, origin, dir, random()*360, color[0],color[1], color[2],1, alphaFade, radius, qfalse ); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:3125:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. CG_ImpactMark( mark, origin, dir, random()*360, 1,1,1,1, alphaFade, radius, qfalse ); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:3412:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. begin = 50 + random() * (len - 60); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:3585:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( random() < cg_tracerChance.value ) { data/openarena-0.8.8+dfsg/code/game/ai_chat.c:244:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. count = random() * numopponents; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:314:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() * 11.9; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:421:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:454:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:491:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:526:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:578:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:623:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->botdeathtype == MOD_BFG_SPLASH) && random() < 0.5) { data/openarena-0.8.8+dfsg/code/game/ai_chat.c:642:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (random() < trap_Characteristic_BFloat(bs->character, CHARACTERISTIC_CHAT_INSULT, 0, 1)) { data/openarena-0.8.8+dfsg/code/game/ai_chat.c:677:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:712:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (random() < trap_Characteristic_BFloat(bs->character, CHARACTERISTIC_CHAT_INSULT, 0, 1)) { data/openarena-0.8.8+dfsg/code/game/ai_chat.c:743:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:783:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd * 0.5) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:823:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd * 0.5) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:861:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd * 0.5) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:899:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > bs->thinktime * 0.1) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:901:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > rnd) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:902:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > 0.25) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:921:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < trap_Characteristic_BFloat(bs->character, CHARACTERISTIC_CHAT_MISC, 0, 1)) { data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:446:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > (float ) 1.0 / (NumPlayersOnSameTeam(bs)-1)) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:590:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:643:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:692:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:741:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:787:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:873:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:914:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:961:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1010:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1052:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1098:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1182:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1775:45: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->leadmessage_time = -(FloatTime() + 2 * random()); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1804:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:448:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * croucher) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:468:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (random() < bs->thinktime * 0.05) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:480:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (random() < bs->thinktime * 0.8) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:551:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->defendaway_time = FloatTime() + 3 + 3 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:577:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->defendaway_time = FloatTime() + 3 + 3 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:642:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->defendaway_time = FloatTime() + 3 + 3 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:744:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * 0.8) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:754:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * croucher) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:890:53: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->rushbaseaway_time = FloatTime() + 5 + 10 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:989:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->attackaway_time = FloatTime() + 2 + 5 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1032:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->attackaway_time = FloatTime() + 3 + 5 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1037:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->attackaway_time = FloatTime() + 3 + 5 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1095:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->attackaway_time = FloatTime() + 2 + 5 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1116:50: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->harvestaway_time = FloatTime() + 4 + 3 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1336:40: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->respawn_time = FloatTime() + 1 + random(); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1691:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * 0.8) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1826:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * 0.8) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1930:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * 1) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:2017:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < bs->thinktime * 0.8) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:2033:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (random() < bs->thinktime * 0.8) { data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:2135:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.2) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:644:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.5) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:701:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:755:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:771:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1077:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1093:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1191:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1207:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1336:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1382:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2582:62: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else bs->teamgoal_time = FloatTime() + 120 + 180 * camper + random() * 15; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2617:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > camper) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2695:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random(); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2698:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.5) bestorg[0] -= 800 * random() + 100; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2698:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.5) bestorg[0] -= 800 * random() + 100; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2699:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else bestorg[0] += 800 * random() + 100; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2703:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.5) bestorg[1] -= 800 * random() + 100; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2703:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.5) bestorg[1] -= 800 * random() + 100; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2704:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else bestorg[1] += 800 * random() + 100; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2787:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < jumper) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2791:55: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. else if (bs->attackcrouch_time < FloatTime() - 1 && random() < croucher) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2833:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > 0.935) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2850:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > 0.9) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3455:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > 0.1) aim_accuracy *= 0.4f; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3700:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() > firethrottle) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4516:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. angles[1] = random() * 360; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4592:30: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. VectorSet(angles, 0, 360 * random(), 0); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4726:58: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (m.type == CMS_CHAT && m.time > FloatTime() - (1 + random())) break; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4787:10: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 1.5 / (NumBots()+1) && random() < chat_reply) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4787:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 1.5 / (NumBots()+1) && random() < chat_reply) { data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5203:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = (float) random() * numaltroutegoals; data/openarena-0.8.8+dfsg/code/game/ai_team.c:2123:49: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->askteamleader_time = FloatTime() + 5 + random() * 10; data/openarena-0.8.8+dfsg/code/game/ai_team.c:2126:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->becometeamleader_time = FloatTime() + 5 + random() * 10; data/openarena-0.8.8+dfsg/code/game/ai_team.c:2134:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->becometeamleader_time = FloatTime() + 8 + random() * 10; data/openarena-0.8.8+dfsg/code/game/ai_team.c:2189:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.4) { data/openarena-0.8.8+dfsg/code/game/ai_team.c:2232:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (random() < 0.4) { data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:90:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:125:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:143:44: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:190:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:276:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:332:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:379:43: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bs->teammessage_time = FloatTime() + 2 * random(); data/openarena-0.8.8+dfsg/code/game/bg_lib.c:770:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void srand( unsigned seed ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.h:82:6: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void srand( unsigned seed ); data/openarena-0.8.8+dfsg/code/game/g_bot.c:272:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num = random() * num; data/openarena-0.8.8+dfsg/code/game/g_client.c:237:8: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. rnd = random() * (numSpots / 2); data/openarena-0.8.8+dfsg/code/game/g_items.c:552:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random ) { data/openarena-0.8.8+dfsg/code/game/g_items.c:553:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. respawn += crandom() * ent->random; data/openarena-0.8.8+dfsg/code/game/g_items.c:952:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/openarena-0.8.8+dfsg/code/game/g_local.h:180:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. float random; data/openarena-0.8.8+dfsg/code/game/g_main.c:698:2: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand( randomSeed ); data/openarena-0.8.8+dfsg/code/game/g_misc.c:274:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. deg = crandom() * ent->random; data/openarena-0.8.8+dfsg/code/game/g_misc.c:277:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. deg = crandom() * ent->random; data/openarena-0.8.8+dfsg/code/game/g_misc.c:312:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( !ent->random ) { data/openarena-0.8.8+dfsg/code/game/g_misc.c:315:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->random = sin( M_PI * ent->random / 180 ); data/openarena-0.8.8+dfsg/code/game/g_missile.c:827:6: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. r = random() * M_PI * 2.0f; data/openarena-0.8.8+dfsg/code/game/g_missile.c:836:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. scale = 555 + random() * 1800; data/openarena-0.8.8+dfsg/code/game/g_spawn.c:110:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. {"random", FOFS(random), F_FLOAT}, data/openarena-0.8.8+dfsg/code/game/g_target.c:99:51: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/openarena-0.8.8+dfsg/code/game/g_target.c:203:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/openarena-0.8.8+dfsg/code/game/g_target.c:226:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->s.clientNum = ent->random * 10; data/openarena-0.8.8+dfsg/code/game/g_trigger.c:66:52: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->nextthink = level.time + ( ent->wait + ent->random * crandom() ) * 1000; data/openarena-0.8.8+dfsg/code/game/g_trigger.c:96:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "0", &ent->random ); data/openarena-0.8.8+dfsg/code/game/g_trigger.c:98:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( ent->random >= ent->wait && ent->wait >= 0 ) { data/openarena-0.8.8+dfsg/code/game/g_trigger.c:432:73: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. self->nextthink = level.time + 1000 * ( self->wait + crandom() * self->random ); data/openarena-0.8.8+dfsg/code/game/g_trigger.c:449:38: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. G_SpawnFloat( "random", "1", &self->random); data/openarena-0.8.8+dfsg/code/game/g_trigger.c:455:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if ( self->random >= self->wait ) { data/openarena-0.8.8+dfsg/code/game/g_weapon.c:1170:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ent->client->ps.velocity[2] = 30 + random() * 25; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:584:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define random() ((rand () & 0x7fff) / ((float)0x7fff)) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:585:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. #define crandom() (2.0 * (random() - 0.5)) data/openarena-0.8.8+dfsg/code/botlib/be_aas_def.h:204:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH]; data/openarena-0.8.8+dfsg/code/botlib/be_aas_def.h:205:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_PATH]; data/openarena-0.8.8+dfsg/code/botlib/be_aas_def.h:261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *configstrings[MAX_CONFIGSTRINGS]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_chat.h:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_MESSAGE_SIZE]; //message data/openarena-0.8.8+dfsg/code/botlib/be_ai_chat.h:63:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_weap.h:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_weap.h:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_weap.h:65:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_STRINGFIELD]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_weap.h:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_STRINGFIELD]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_weap.h:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char projectile[MAX_STRINGFIELD]; data/openarena-0.8.8+dfsg/code/botlib/be_ai_weight.h:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/botlib/botlib.h:122:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/openarena-0.8.8+dfsg/code/botlib/l_precomp.h:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[1024]; //file name of the script data/openarena-0.8.8+dfsg/code/botlib/l_precomp.h:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char includepath[1024]; //path to include files data/openarena-0.8.8+dfsg/code/botlib/l_precomp.h:170:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/openarena-0.8.8+dfsg/code/botlib/l_script.h:159:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKEN]; //available token data/openarena-0.8.8+dfsg/code/botlib/l_script.h:176:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[1024]; //file name of the script data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:51:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test[4]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:59:54: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trap_SendConsoleCommand( va( "gc %i %i", targetNum, atoi( test ) ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:163:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:240:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:241:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:271:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:457:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/cgame/cg_consolecmds.c:460:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi(var) ) { data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:41:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systemChat[256]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:42:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChat1[256]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:43:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChat2[256]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:148:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor[0], &color[0], sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:213:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16], *ptr; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:1196:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:1934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:2284:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linebuffer[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:2607:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rendererinfos[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:3056:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s [32]; data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:41:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[64]; data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetName[32]; data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:90:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char attackerName[32]; data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:242:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( attackerName, "noname" ); data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:425:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char weapon[5]; data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char personality[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:100:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:156:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:192:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( buf ) ) { data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:287:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi( Info_ValueForKey( info, "timelimit" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:295:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi( Info_ValueForKey( info, "fraglimit" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_info.c:304:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi( Info_ValueForKey( info, "capturelimit" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:350:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:351:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:352:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headModelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:353:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headSkinName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:354:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char redTeam[MAX_TEAMNAME]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:355:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blueTeam[MAX_TEAMNAME]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:541:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoScreenText[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:560:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char killerName[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:561:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spectatorList[MAX_STRING_CHARS]; // list of names data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:577:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char centerPrint[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:662:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testModelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1091:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1092:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char redTeam[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1093:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blueTeam[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1099:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteString[MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamVoteString[2][MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domination_points_names[MAX_DOMINATION_POINTS][MAX_DOMINATION_POINTS_NAMES]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1153:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamChatMsgs[TEAMCHAT_HEIGHT][TEAMCHAT_WIDTH*3+1]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1174:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char acceptVoice[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1466:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char systemChat[256]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1467:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char teamChat1[256]; data/openarena-0.8.8+dfsg/code/cgame/cg_local.h:1468:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char teamChat2[256]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:478:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char var[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:487:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.localServer = atoi( var ); data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:596:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:607:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:618:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:629:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:644:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:663:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:690:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (data, start, len); data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:712:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char items[MAX_ITEMS+1]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:994:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char items[MAX_ITEMS+1]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:995:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *sb_nums[11] = { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1263:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[10]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1405:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char parm1[MAX_QPATH], parm2[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1422:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUFILE]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1673:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUDEFFILE]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1928:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1986:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2132:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( s ); data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2259:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char rendererinfos[128]; data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2263:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(cg_autovertex.integer && atoi( rendererinfos ) == 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2273:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) > 80 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2279:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi( rendererinfos )!=0 && atoi( rendererinfos )!=1 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2279:41: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi( rendererinfos )!=0 && atoi( rendererinfos )!=1 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2287:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) > 20 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2293:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) > 3 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2296:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). } else if(atoi( rendererinfos ) < 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2302:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) > 2 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2305:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). } else if(atoi( rendererinfos ) < 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2311:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) > 2 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2314:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). } else if(atoi( rendererinfos ) < 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2320:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) > 2 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2323:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). } else if(atoi( rendererinfos ) < 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2331:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) != 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:2337:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if(atoi( rendererinfos ) == 0 ) { data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:222:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( mark->verts, verts, mf->numPoints * sizeof( verts[0] ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:367:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *shaderAnimNames[MAX_SHADER_ANIMS] = { data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:1582:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:1615:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numparticles = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:1618:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). turb = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_marks.c:1621:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). snum = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:250:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:331:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:350:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:476:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:593:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:613:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:626:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:748:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:835:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:94:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *shaderAnimNames[MAX_SHADER_ANIMS] = { data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:1324:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). type = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:1357:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numparticles = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:1360:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). turb = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_particles.c:1363:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). snum = atoi (token); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:26:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *cg_customSoundNames[MAX_CUSTOM_SOUNDS] = { data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:97:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:208:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:221:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:235:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:255:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&animations[LEGS_BACKCR], &animations[LEGS_WALKCR], sizeof(animation_t)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:258:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&animations[LEGS_BACKWALK], &animations[LEGS_WALK], sizeof(animation_t)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:465:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:523:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH*2]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:525:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newTeamName[MAX_QPATH*2]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:626:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). val = atoi( v ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:656:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamname[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:908:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.botSkill = atoi( v ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:912:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.handicap = atoi( v ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:916:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.wins = atoi( v ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:920:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.losses = atoi( v ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:924:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.team = atoi( v ); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:928:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.teamTask = atoi(v); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:932:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.teamLeader = atoi(v); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:945:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelStr[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:989:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelStr[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:2462:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&powerup, &torso, sizeof(torso)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:2470:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&powerup, &torso, sizeof(torso)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:2478:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&powerup, &torso, sizeof(torso)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:2486:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&powerup, &torso, sizeof(torso)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:2505:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&powerup, &torso, sizeof(torso)); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:2529:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&powerup, &torso, sizeof(torso)); data/openarena-0.8.8+dfsg/code/cgame/cg_scoreboard.c:82:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:70:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.numScores = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:75:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.teamScores[0] = atoi( CG_Argv( 2 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:76:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.teamScores[1] = atoi( CG_Argv( 3 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:78:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.roundStartTime = atoi( CG_Argv( 4 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:94:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].client = atoi( CG_Argv( i * NUM_DATA + FIRST_DATA + 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:95:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].score = atoi( CG_Argv( i * NUM_DATA + FIRST_DATA + 2 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:96:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].ping = atoi( CG_Argv( i * NUM_DATA + FIRST_DATA + 3 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:97:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].time = atoi( CG_Argv( i * NUM_DATA + FIRST_DATA + 4 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:98:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].scoreFlags = atoi( CG_Argv( i * NUM_DATA + FIRST_DATA + 5 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:99:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). powerups = atoi( CG_Argv( i * NUM_DATA + FIRST_DATA + 6 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:100:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].accuracy = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 7)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:101:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].impressiveCount = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 8)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:102:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].excellentCount = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 9)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:103:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].guantletCount = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 10)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:104:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].defendCount = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 11)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:105:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].assistCount = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 12)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:106:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].perfect = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 13)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:107:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].captures = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 14)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:108:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.scores[i].isDead = atoi(CG_Argv(i * NUM_DATA + FIRST_DATA + 15)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:130:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.accuracys[i-WP_MACHINEGUN][0] = atoi( CG_Argv( (i-WP_MACHINEGUN)*2 + 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:131:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.accuracys[i-WP_MACHINEGUN][1] = atoi( CG_Argv( (i-WP_MACHINEGUN)*2 + 2 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:149:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:150:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( CG_Argv( 2 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:152:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.roundStartTime = atoi( CG_Argv( 3 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:207:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.timetaken = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:218:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.domination_points_count = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:237:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( cgs.domination_points_count!=atoi( CG_Argv(1) ) ) { data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:242:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.domination_points_status[i] = atoi( CG_Argv(2+i) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:253:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). addChallenge(atoi( CG_Argv(1) ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:257:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.redObeliskHealth = atoi( CG_Argv(1) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:258:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.blueObeliskHealth = atoi( CG_Argv(2) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:265:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.respawnTime = atoi( CG_Argv(1) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:288:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). temp = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:307:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numSortedTeamPlayers = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:316:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client = atoi( CG_Argv( i * 6 + 2 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:326:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].location = atoi( CG_Argv( i * 6 + 3 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:327:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].health = atoi( CG_Argv( i * 6 + 4 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:328:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].armor = atoi( CG_Argv( i * 6 + 5 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:329:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].curWeapon = atoi( CG_Argv( i * 6 + 6 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:330:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.clientinfo[ client ].powerups = atoi( CG_Argv( i * 6 + 7 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:348:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.gametype = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:355:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.dmflags = atoi( Info_ValueForKey( info, "dmflags" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:356:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.videoflags = atoi( Info_ValueForKey( info, "videoflags" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:357:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.elimflags = atoi( Info_ValueForKey( info, "elimflags" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:358:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamflags = atoi( Info_ValueForKey( info, "teamflags" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:359:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.fraglimit = atoi( Info_ValueForKey( info, "fraglimit" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:360:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.capturelimit = atoi( Info_ValueForKey( info, "capturelimit" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:361:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.timelimit = atoi( Info_ValueForKey( info, "timelimit" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:362:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.maxclients = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:363:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.roundtime = atoi( Info_ValueForKey( info, "elimination_roundtime" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:364:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.nopickup = atoi( Info_ValueForKey( info, "g_rockets" ) ) + atoi( Info_ValueForKey( info, "g_instantgib" ) ) + atoi( Info_ValueForKey( info, "g_elimination" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:364:65: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.nopickup = atoi( Info_ValueForKey( info, "g_rockets" ) ) + atoi( Info_ValueForKey( info, "g_instantgib" ) ) + atoi( Info_ValueForKey( info, "g_elimination" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:364:116: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.nopickup = atoi( Info_ValueForKey( info, "g_rockets" ) ) + atoi( Info_ValueForKey( info, "g_instantgib" ) ) + atoi( Info_ValueForKey( info, "g_elimination" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:365:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.lms_mode = atoi( Info_ValueForKey( info, "g_lms_mode" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:366:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.altExcellent = atoi( Info_ValueForKey( info, "g_altExcellent" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:376:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.delagHitscan = atoi( Info_ValueForKey( info, "g_delagHitscan" ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:395:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). warmup = atoi( info ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:424:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( CG_ConfigString( CS_SCORES1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:425:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( CG_ConfigString( CS_SCORES2 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:426:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( CG_ConfigString( CS_LEVEL_START_TIME ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:438:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.warmup = atoi( CG_ConfigString( CS_WARMUP ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:447:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char originalShader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:448:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newShader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:449:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timeOffset[16]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:491:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:508:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores1 = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:510:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.scores2 = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:512:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.levelStartTime = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:514:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteTime = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:517:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteYes = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:520:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.voteNo = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:528:44: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteTime[num-CS_TEAMVOTE_TIME] = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:531:42: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteYes[num-CS_TEAMVOTE_YES] = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:534:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cgs.teamVoteNo[num-CS_TEAMVOTE_NO] = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:542:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). cg.intermissionStarted = atoi( str ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:706:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char id[64]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:709:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chats[MAX_VOICESOUNDS][MAX_CHATSIZE]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:714:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headmodel[64]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:737:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_VOICEFILESIZE]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:858:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_VOICEFILESIZE]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:924:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH], headModelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1015:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[MAX_SAY_TEXT]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1016:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[MAX_SAY_TEXT]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1086:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&voiceChatBuffer[cg.voiceChatBufferIn], vchat, sizeof(bufferedVoiceChat_t)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1155:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). voiceOnly = atoi(CG_Argv(1)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1156:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clientNum = atoi(CG_Argv(2)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1157:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). color = atoi(CG_Argv(3)); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SAY_TEXT]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1323:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader1[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1324:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader2[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1325:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader3[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:1372:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoString[1024]; data/openarena-0.8.8+dfsg/code/cgame/cg_snapshot.c:110:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(¢->currentState, state, sizeof(entityState_t)); data/openarena-0.8.8+dfsg/code/cgame/cg_snapshot.c:216:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(¢->nextState, es, sizeof(entityState_t)); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:770:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:821:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_flash.md3" ); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:826:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_barrel.md3" ); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:831:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_hand.md3" ); data/openarena-0.8.8+dfsg/code/cgame/cg_weapons.c:2591:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). num = atoi( CG_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/game/ai_chat.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:82:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:96:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:109:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:124:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:137:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:153:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:167:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:187:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:201:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:220:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:223:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:237:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[1024]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:264:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mapname[128]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:410:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:443:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:476:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:508:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:568:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:585:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "[world]"); data/openarena-0.8.8+dfsg/code/game/ai_chat.c:667:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:729:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:763:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:802:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:847:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32], *weap; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:886:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:966:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:196:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &cp->goal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:209:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestring[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:247:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:295:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:317:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyarea[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:397:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addressedto[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:398:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:399:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:400:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botname[128]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:494:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:495:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:496:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:619:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:620:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:669:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:718:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:765:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:766:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:806:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:807:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:897:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:936:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:986:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1031:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1073:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammatename[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1201:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1226:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1270:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1271:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1326:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1349:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1374:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1397:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1423:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1424:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1452:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1470:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char goalname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1586:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1606:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &tmpgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1622:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1716:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE], teammate[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1784:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char enemy[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1785:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1823:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flag[128], netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1867:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1881:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:63:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nodeswitch[MAX_NODESWITCHES+1][144]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:315:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:340:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:388:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:516:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:546:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:572:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:630:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:688:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:721:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:793:19: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (wp->next) strcat(buf, " to "); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:837:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->curpatrolpoint->goal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:853:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &ctf_blueflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:854:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &ctf_redflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:876:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &ctf_redflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:877:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &ctf_blueflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:911:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &ctf_blueflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:912:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &ctf_redflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:935:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &ctf_neutralflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:949:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &ctf_blueflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:950:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &ctf_redflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:979:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &ctf_blueflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:980:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &ctf_redflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1022:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &blueobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1023:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &redobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1052:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &blueobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1053:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &redobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1085:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(goal, &blueobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1086:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(goal, &redobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1109:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &neutralobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammate[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1191:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->lead_teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1736:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:1869:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:120:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char allowedGametypes[MAX_EPAIRKEY]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:379:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->lastgoal_teamgoal, &bs->teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:482:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->teamgoal, &bs->lastgoal_teamgoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:786:32: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:787:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:874:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:876:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:887:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:894:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:991:34: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:992:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1024:34: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1025:10: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1106:32: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1107:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1212:32: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &blueobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1213:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &redobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1226:32: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &redobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1227:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &blueobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1250:31: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &blueobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1251:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &redobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1392:32: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (BotTeam(bs) == TEAM_RED) memcpy(&bs->teamgoal, &redobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1393:8: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. else memcpy(&bs->teamgoal, &blueobelisk, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1504:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1523:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1542:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1562:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1603:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2191:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) return qtrue; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2578:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->teamgoal, goal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:2635:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bestgoal, &goal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3783:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[1024]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3784:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3923:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3936:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelindex = atoi(model+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4076:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4083:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelindex = atoi(model+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4121:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelindex = atoi(model+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4192:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->activategoalheap[best], activategoal, sizeof(bot_activategoal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_INFO_STRING], tmpmodel[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4267:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[128], classname[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char targetname[10][128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4314:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelindex = atoi(model+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4483:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classname[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4484:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4713:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botname[MAX_NETNAME], message[MAX_MESSAGE_SIZE], netname[MAX_NETNAME], *ptr; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:4874:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5177:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(goal, &bs->altroutegoal, sizeof(bot_goal_t)); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5307:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gender[144], name[144], buf[144]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5308:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5459:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5492:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[128]; data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:5566:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). modelnum = atoi(model+1); data/openarena-0.8.8+dfsg/code/game/ai_main.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[2048]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:175:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( state, &ent->client->ps, sizeof(playerState_t) ); data/openarena-0.8.8+dfsg/code/game/ai_main.c:193:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( state, &ent->s, sizeof(entityState_t) ); data/openarena-0.8.8+dfsg/code/game/ai_main.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *vars[MAX_MATCHVARIABLES]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:280:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char goalname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:281:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:282:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *leader, flagstatus[32]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:288:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(flagstatus, " "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:400:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:411:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_RED) { data/openarena-0.8.8+dfsg/code/game/ai_main.c:424:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_BLUE) { data/openarena-0.8.8+dfsg/code/game/ai_main.c:436:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char goalname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:437:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char action[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:439:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *leader, carrying[32], *cs; data/openarena-0.8.8+dfsg/code/game/ai_main.c:446:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(carrying, " "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:449:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(carrying, "F "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:454:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(carrying, "F "); data/openarena-0.8.8+dfsg/code/game/ai_main.c:563:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:997:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024], *args; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1187:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH], name[MAX_PATH], gender[MAX_PATH]; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1219:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->settings, settings, sizeof(bot_settings_t)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1349:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&settings, &bs->settings, sizeof(bot_settings_t)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1350:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ps, &bs->cur_ps, sizeof(playerState_t)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1370:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->cur_ps, &ps, sizeof(playerState_t)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1371:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&bs->settings, &settings, sizeof(bot_settings_t)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1613:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[144]; data/openarena-0.8.8+dfsg/code/game/ai_main.h:105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/game/ai_main.h:261:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamleader[32]; //netname of the team leader data/openarena-0.8.8+dfsg/code/game/ai_main.h:274:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char subteam[32]; //sub team name data/openarena-0.8.8+dfsg/code/game/ai_main.h:276:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char formation_teammate[16]; //netname of the team mate the bot uses for relative positioning data/openarena-0.8.8+dfsg/code/game/ai_team.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[36]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:97:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:155:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:188:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:205:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:236:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammatename[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:249:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teammatename[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:283:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&teammates[numteammates], defenders, numdefenders * sizeof(int)); data/openarena-0.8.8+dfsg/code/game/ai_team.c:286:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&teammates[numteammates], roamers, numroamers * sizeof(int)); data/openarena-0.8.8+dfsg/code/game/ai_team.c:289:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&teammates[numteammates], attackers, numattackers * sizeof(int)); data/openarena-0.8.8+dfsg/code/game/ai_team.c:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamchat[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:303:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:328:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:503:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:663:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:768:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:818:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1018:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], leadername[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1048:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1060:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(Info_ValueForKey(buf, "t")) == TEAM_SPECTATOR) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME], carriername[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1469:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1618:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1781:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1930:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_team.c:2109:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:168:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(&bs->teamgoal, &redobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:169:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(&bs->teamgoal, &blueobelisk, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:177:19: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_RED: memcpy(&bs->teamgoal, &ctf_redflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:178:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. case TEAM_BLUE: memcpy(&bs->teamgoal, &ctf_blueflag, sizeof(bot_goal_t)); break; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:246:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:406:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:420:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_MESSAGE_SIZE]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:439:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:460:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:498:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ptr, buf[MAX_MESSAGE_SIZE], *cmd; data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:512:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). voiceOnly = atoi(ptr); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:515:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clientNum = atoi(ptr); data/openarena-0.8.8+dfsg/code/game/ai_vcmd.c:518:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). color = atoi(ptr); data/openarena-0.8.8+dfsg/code/game/bg_alloc.c:46:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[POOLSIZE]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:301:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[i] = ((char *)src)[i]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:301:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[i] = ((char *)src)[i]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:305:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[i] = ((char *)src)[i]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:305:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[i] = ((char *)src)[i]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:320:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[count] = c; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:325:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy( void *dest, const void *src, size_t count ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.c:327:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[count] = ((char *)src)[count]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:327:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)dest)[count] = ((char *)src)[count]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:1145:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi( const char *string ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.c:1811:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char convert[24]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:1941:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconvert[20]; data/openarena-0.8.8+dfsg/code/game/bg_lib.c:1942:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fconvert[20]; data/openarena-0.8.8+dfsg/code/game/bg_lib.h:100:5: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int atoi( const char *string ); data/openarena-0.8.8+dfsg/code/game/bg_lib.h:112:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. void *memcpy( void *dest, const void *src, size_t count ); data/openarena-0.8.8+dfsg/code/game/bg_misc.c:1567:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openarena-0.8.8+dfsg/code/game/bg_public.h:681:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *world_model[MAX_ITEM_MODELS]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:46:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char g_bfb[ 32000 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:306:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testName[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:307:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:399:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char levels[ MAX_STRING_CHARS ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:611:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:615:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags[ MAX_ADMIN_FLAGS * 2 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:618:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:709:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_stub[9]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:710:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:711:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:712:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lname[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:869:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duration[ 32 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:885:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duration[ 32 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:906:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[ MAX_ADMIN_CMD_LEN ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:990:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n1[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:991:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1236:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char levels[ MAX_STRING_CHARS ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1247:37: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). c->levels[ cmdlevel++ ] = atoi( lp ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:1331:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1332:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lstr[ 11 ]; // 10 is max strlen() for 32-bit int data/openarena-0.8.8+dfsg/code/game/g_admin.c:1333:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adminname[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1334:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char testname[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1335:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[ 33 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1353:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). l = atoi( lstr ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:1364:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). id = atoi( name ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:1634:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ], *reason, err[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1691:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1692:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secs[ MAX_TOKEN_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1695:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duration[ 32 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1699:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1700:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1701:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_stub[ 9 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1906:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bs[ 5 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1914:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bnum = atoi( bs ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:1950:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duration[ 32 ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1952:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bs[ 5 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1953:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char secs[ MAX_TOKEN_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:1963:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). bnum = atoi( bs ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:2055:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ], team[ MAX_NAME_LENGTH ], err[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2101:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[ MAX_QPATH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2127:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ], err[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2128:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[ MAX_ADMIN_CMD_LEN ], *cmd; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2188:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2189:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2217:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). start = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:2267:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[ 3 ], t[ 2 ]; // color and team letter data/openarena-0.8.8+dfsg/code/game/g_admin.c:2268:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2269:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2270:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n3[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2271:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lname[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2272:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_stub[ 9 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2273:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char muted[ 2 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2385:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duration[ 32 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2390:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filter[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2391:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date[ 11 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2394:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n1[ MAX_NAME_LENGTH * 2 ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2395:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH * 2 ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2399:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_match[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2425:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). start = atoi( filter ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:2448:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). start = atoi( filter ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:2632:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char param[ MAX_ADMIN_CMD_LEN ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2825:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2826:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2827:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldname[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2828:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2829:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[ MAX_INFO_STRING ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2880:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char layout[ MAX_CVAR_VALUE_STRING ] = { "" }; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2884:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[ MAX_QPATH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2910:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char search[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2911:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2912:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2913:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid_stub[ 9 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:2965:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamName[2] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3015:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamName[2] = {""}; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3065:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH], err[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3111:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH], err[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3144:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH], err[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char damage[4]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3161:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). dmg = atoi(damage); data/openarena-0.8.8+dfsg/code/game/g_admin.c:3270:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ], err[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3273:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char duration[ 32 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3274:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.c:3410:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char m2[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:100:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:101:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags[ MAX_ADMIN_FLAGS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:107:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[ 33 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:110:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flags[ MAX_ADMIN_FLAGS ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:116:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:117:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[ 33 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:118:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[ 40 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:119:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reason[ MAX_ADMIN_BAN_REASON ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:120:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char made[ 18 ]; // big enough for strftime() %c data/openarena-0.8.8+dfsg/code/game/g_admin.h:122:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char banner[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:128:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[ MAX_ADMIN_CMD_LEN ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:129:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char exec[ MAX_QPATH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:130:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char desc[ 50 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:137:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_ADMIN_NAMELOG_NAMES ][ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:138:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[ 40 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[ 33 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[ 33 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:148:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[ 40 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:149:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char warning[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char made[ 18 ]; data/openarena-0.8.8+dfsg/code/game/g_admin.h:151:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char warner[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/game/g_arenas.c:49:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openarena-0.8.8+dfsg/code/game/g_arenas.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *g_botInfos[MAX_BOTS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *g_arenaInfos[MAX_ARENAS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:106:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( token, "<NULL>" ); data/openarena-0.8.8+dfsg/code/game/g_bot.c:131:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ARENAS_TEXT]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:159:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:160:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:180:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename, "scripts/"); data/openarena-0.8.8+dfsg/code/game/g_bot.c:216:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:243:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *value, netname[36], *teamstr; data/openarena-0.8.8+dfsg/code/game/g_bot.c:484:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:584:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:719:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:720:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char altname[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:721:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:722:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:754:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). delay = atoi( string ); data/openarena-0.8.8+dfsg/code/game/g_bot.c:777:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:778:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char funname[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:779:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:780:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aifile[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:786:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name, "UnnamedPlayer"); data/openarena-0.8.8+dfsg/code/game/g_bot.c:794:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(model, "sarge/default"); data/openarena-0.8.8+dfsg/code/game/g_bot.c:798:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(aifile, "bots/default_c.c"); data/openarena-0.8.8+dfsg/code/game/g_bot.c:815:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bots[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:871:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BOTS_TEXT]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:899:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:900:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:924:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename, "scripts/"); data/openarena-0.8.8+dfsg/code/game/g_bot.c:977:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:978:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_bot.c:994:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fragLimit = atoi( strValue ); data/openarena-0.8.8+dfsg/code/game/g_bot.c:1003:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). timeLimit = atoi( strValue ); data/openarena-0.8.8+dfsg/code/game/g_client.c:1104:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1105:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headModel[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1106:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldname[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char err[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1112:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c1[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1113:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c2[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1114:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char redTeam[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1115:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blueTeam[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1125:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (userinfo, "\\name\\badinfo"); data/openarena-0.8.8+dfsg/code/game/g_client.c:1136:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/openarena-0.8.8+dfsg/code/game/g_client.c:1145:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( !atoi( s ) ) { data/openarena-0.8.8+dfsg/code/game/g_client.c:1148:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->pers.delag = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_client.c:1153:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->pers.cmdTimeNudge = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_client.c:1260:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). health = atoi( Info_ValueForKey( userinfo, "handicap" ) ); data/openarena-0.8.8+dfsg/code/game/g_client.c:1320:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if ( ! *s || atoi( s ) != 0 ) { data/openarena-0.8.8+dfsg/code/game/g_client.c:1337:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). teamTask = atoi(Info_ValueForKey(userinfo, "teamtask")); data/openarena-0.8.8+dfsg/code/game/g_client.c:1411:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1413:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char reason[ MAX_STRING_CHARS ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_client.c:1538:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char motd[1024]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1543:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy (motd, "cp \""); data/openarena-0.8.8+dfsg/code/game/g_client.c:1578:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1710:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_client.c:1860:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(persistant,client->ps.persistant,MAX_PERSISTANT*sizeof(int)); data/openarena-0.8.8+dfsg/code/game/g_client.c:1891:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). client->pers.maxHealth = atoi( Info_ValueForKey( userinfo, "handicap" ) ); data/openarena-0.8.8+dfsg/code/game/g_client.c:2112:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1400]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:146:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[10]; //Will more likely be 2... in fact cannot be more since we are the server data/openarena-0.8.8+dfsg/code/game/g_cmds.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[10*(MAX_DOMINATION_POINTS+1)]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_DOMINATION_POINTS_NAMES*MAX_DOMINATION_POINTS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:340:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char line[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:342:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:352:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( line + len, arg, tlen ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:376:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cleanName[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:380:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:635:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:636:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:644:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). task = atoi( arg ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:712:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:902:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:954:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1014:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char args[11]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1132:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SAY_TEXT]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1133:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char location[64]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1202:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1245:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1252:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). targetNum = atoi( arg ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1347:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1389:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1401:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). targetNum = atoi( arg ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1510:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1513:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). player = atoi( str ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1515:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). order = atoi( str ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1562:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg1[MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1563:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg2[MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1564:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1616:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer,"print \"Vote commands are: "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1618:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "map_restart, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1620:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "nextmap, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1622:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "map <mapname>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1624:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "g_gametype <n>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1626:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "kick <player>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1628:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "clientkick <clientnum>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1630:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "g_doWarmup, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1632:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "timelimit <time>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1634:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "fraglimit <frags>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1636:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "shuffle, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1638:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "custom <special>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1640:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, ".\""); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1648:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer,"print \"Vote commands are: "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1650:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "map_restart, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1652:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "nextmap, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1654:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "map <mapname>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1656:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "g_gametype <n>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1658:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "kick <player>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1660:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "clientkick <clientnum>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1662:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "shuffle, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1664:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "g_doWarmup, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1666:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "timelimit <time>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1668:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "fraglimit <frags>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1670:21: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, "custom <special>, "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1672:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buffer, ".\""); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1688:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1689:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( arg2 ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1716:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1732:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1754:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(arg2); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1766:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(arg2); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1781:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(arg2); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1791:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi(arg2); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1884:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1925:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg1[MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1926:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg2[MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1969:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME], leader[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1981:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( arg2 ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:2052:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[64]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:2101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:2151:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[(MAX_MAPNAME+1)*MAPS_PER_PAGE+1]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:2152:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arg[MAX_STRING_TOKENS]; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:2154:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). page = getMappage(atoi(arg)); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:2232:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[ MAX_TOKEN_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:137:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[ MAX_NAME_LENGTH + 10 ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:227:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:228:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[ MAX_NAME_LENGTH ] = {""}; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:237:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:452:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[ 1024 ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:453:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outstring[ 1024 ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:490:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[ sizeof( "say_team" ) ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:491:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prefix[ 50 ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:627:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s2[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:628:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char n2[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:634:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_fileops.c:48:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *v = atoi( t ); data/openarena-0.8.8+dfsg/code/game/g_fileops.c:92:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ 32 ]; data/openarena-0.8.8+dfsg/code/game/g_fileops.c:108:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_items.c:123:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_items.c:910:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_ITEMS+1]; data/openarena-0.8.8+dfsg/code/game/g_items.c:935:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[128]; data/openarena-0.8.8+dfsg/code/game/g_killspree.c:223:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char output[ MAX_SAY_TEXT ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.c:240:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char output[ MAX_SAY_TEXT ] = { "" }; data/openarena-0.8.8+dfsg/code/game/g_killspree.c:242:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_NAME_LENGTH ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.c:339:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char streakcount[ 3 ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.c:469:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char multiKillString[ 2 ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.h:42:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spreeMsg[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.h:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sound2Play[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.h:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spreeMsg[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.h:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sound2Play[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.h:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char killMsg[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_killspree.h:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sound2Play[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_local.h:257:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char netname[MAX_NETNAME]; data/openarena-0.8.8+dfsg/code/game/g_local.h:293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[ 33 ]; data/openarena-0.8.8+dfsg/code/game/g_local.h:294:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[ 40 ]; data/openarena-0.8.8+dfsg/code/game/g_local.h:471:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteString[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_local.h:472:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteDisplayString[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_local.h:482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamVoteString[2][MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_local.h:491:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *spawnVars[MAX_SPAWN_VARS][2]; // key / value pairs data/openarena-0.8.8+dfsg/code/game/g_local.h:493:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char spawnVarChars[MAX_SPAWN_VARS_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_local.h:533:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char domination_points_names[MAX_DOMINATION_POINTS][MAX_DOMINATION_POINTS_NAMES]; data/openarena-0.8.8+dfsg/code/game/g_local.h:941:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAPS_PER_PAGE][MAX_MAPNAME]; data/openarena-0.8.8+dfsg/code/game/g_local.h:945:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char votename[MAX_CUSTOMNAME]; //Used like "/callvote custom VOTENAME" data/openarena-0.8.8+dfsg/code/game/g_local.h:946:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char displayname[MAX_CUSTOMDISPLAYNAME]; //Displayed during voting data/openarena-0.8.8+dfsg/code/game/g_local.h:947:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[MAX_CUSTOMCOMMAND]; //The command executed data/openarena-0.8.8+dfsg/code/game/g_local.h:950:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char custom_vote_info[1024]; data/openarena-0.8.8+dfsg/code/game/g_local.h:966:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char characterfile[MAX_FILEPATH]; data/openarena-0.8.8+dfsg/code/game/g_local.h:968:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[MAX_FILEPATH]; data/openarena-0.8.8+dfsg/code/game/g_local.h:1184:59: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void trap_AdjustAreaPortalState( gentity_t *ent, qboolean open ); data/openarena-0.8.8+dfsg/code/game/g_main.c:461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/game/g_main.c:472:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/game/g_main.c:538:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/openarena-0.8.8+dfsg/code/game/g_main.c:734:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_main.c:910:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/game/g_main.c:921:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/game/g_main.c:1510:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nextmap[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_main.c:1511:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d1[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_main.c:1512:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/game/g_main.c:1537:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_FILEPATH]; data/openarena-0.8.8+dfsg/code/game/g_main.c:1548:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4*1024]; // buffer to read file into data/openarena-0.8.8+dfsg/code/game/g_main.c:1549:21: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapnames[1024][20]; // Array of mapnames in the map pool data/openarena-0.8.8+dfsg/code/game/g_main.c:1627:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[1024]; data/openarena-0.8.8+dfsg/code/game/g_main.c:2655:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). SetLeader(team, atoi(level.teamVoteString[cs_offset] + 7)); data/openarena-0.8.8+dfsg/code/game/g_mem.c:33:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[POOLSIZE]; data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:30:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char guid[GUID_SIZE+1]; //The guid is 32 chars long data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:78:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(playerstore[place2store].persistant,ps.persistant,sizeof(int[MAX_PERSISTANT])); data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:79:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(playerstore[place2store].accuracy,level.clients[ps.clientNum].accuracy, sizeof(playerstore[0].accuracy) ); data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:93:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ps->persistant,playerstore[i].persistant,sizeof(int[MAX_PERSISTANT])); data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:94:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(level.clients[ps->clientNum].accuracy, playerstore[i].accuracy,sizeof(playerstore[0].accuracy) ); data/openarena-0.8.8+dfsg/code/game/g_rankings.c:1070:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/game/g_session.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_session.c:164:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_session.c:168:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gt = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_spawn.c:59:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *out = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_spawn.c:296:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cvarname[128]; data/openarena-0.8.8+dfsg/code/game/g_spawn.c:297:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char itemname[128]; data/openarena-0.8.8+dfsg/code/game/g_spawn.c:403:26: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *(int *)(b+f->ofs) = atoi(value); data/openarena-0.8.8+dfsg/code/game/g_spawn.c:535:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dest, string, l+1 ); data/openarena-0.8.8+dfsg/code/game/g_spawn.c:553:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char keyname[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_spawn.c:554:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:80:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char num[128]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:114:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). b[i] = atoi(num); data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iplist_final[MAX_CVAR_VALUE_STRING]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ip[64]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_CVAR_VALUE_STRING]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:266:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:288:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:383:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( s ); data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:421:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:437:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:448:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). idnum = atoi( str ); data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:522:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[ MAX_TOKEN_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:37:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char userinfo[ MAX_INFO_STRING ]; data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:69:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamNum[ 2 ]; data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:138:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *reason, name[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:149:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi( name ) == -1 ) data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:183:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[ MAX_STRING_CHARS ], userinfo[ MAX_INFO_STRING ]; data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:184:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[ BIG_INFO_KEY ], value[ BIG_INFO_VALUE ]; data/openarena-0.8.8+dfsg/code/game/g_svcmds_ext.c:238:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cmd[ 5 ]; data/openarena-0.8.8+dfsg/code/game/g_syscalls.c:171:59: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void trap_AdjustAreaPortalState( gentity_t *ent, qboolean open ) { data/openarena-0.8.8+dfsg/code/game/g_syscalls.c:172:44: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). syscall( G_ADJUST_AREA_PORTAL_STATE, ent, open ); data/openarena-0.8.8+dfsg/code/game/g_target.c:199:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_team.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1024]; data/openarena-0.8.8+dfsg/code/game/g_team.c:261:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char st[4]; data/openarena-0.8.8+dfsg/code/game/g_team.c:1695:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entry[1024]; data/openarena-0.8.8+dfsg/code/game/g_team.c:1696:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[8192]; data/openarena-0.8.8+dfsg/code/game/g_utils.c:28:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldShader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_utils.c:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newShader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/game/g_utils.c:58:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buff[MAX_STRING_CHARS*4]; data/openarena-0.8.8+dfsg/code/game/g_utils.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[(MAX_QPATH * 2) + 5]; data/openarena-0.8.8+dfsg/code/game/g_utils.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/game/g_utils.c:305:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[8][32]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempStr[MAX_VOTENAME_LENGTH]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteNames[MAX_CVAR_VALUE_STRING]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_MAPNAME_BUFFER]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_MAPS_TEXT]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tempStr[MAX_GAMETYPENAME_LENGTH]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:179:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char voteGametypes[MAX_CVAR_VALUE_STRING]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:238:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char custom_vote_info[1024]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:249:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4*1024]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:293:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[4*1024]; data/openarena-0.8.8+dfsg/code/game/g_vote.c:295:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_addbots.c:76:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botnames[7][32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_addbots.c:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_addbots.c:266:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gametype = atoi( Info_ValueForKey( info,"g_gametype" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:35:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:46:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:577:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:778:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[2]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:935:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:944:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:1050:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). mappage.pagenumber = atoi(UI_Argv( 1 )); data/openarena-0.8.8+dfsg/code/q3_ui/ui_challenges.c:64:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char entryIntString[MAX_ENTRIES][MAX_INT_AS_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_cinematics.c:347:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi( UI_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:37:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char lastLoadingText[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dlSizeBuf[64], totalSizeBuf[64], xferRateBuf[64], dlTimeBuf[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerModel[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:717:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:718:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name2[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:729:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(name,"???"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:741:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( name, " or " ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:798:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:821:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[256]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_controls2.c:1252:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char playername[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_demo2.c:74:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[NAMEBUFSIZE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_demo2.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *demolist[MAX_DEMOS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_demo2.c:147:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *demoname, extension[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_demo2.c:245:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_demos.names, "No Demos Found." ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_firstconnect.c:107:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:37:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_botInfos[MAX_BOTS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_arenaInfos[MAX_ARENAS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:45:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[POOLSIZE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:87:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:88:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:121:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( token, "<NULL>" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:143:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ARENAS_TEXT]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:172:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[20*1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:195:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename, "scripts/"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:280:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( *value && atoi(value) == num ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:332:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BOTS_TEXT]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:361:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:362:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:382:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename, "scripts/"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:440:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arenaKey[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:441:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scores[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:458:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). skillScore = atoi( Info_ValueForKey( scores, arenaKey ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:485:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arenaKey[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:486:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scores[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:504:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). oldScore = atoi( Info_ValueForKey( scores, arenaKey ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:521:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:522:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char awardData[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:537:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). oldValue = atoi( Info_ValueForKey( awardData, key ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:550:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:551:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char awardData[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:556:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi( Info_ValueForKey( awardData, key ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:578:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( levelWon == atoi( Info_ValueForKey( info, "num" ) ) ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:582:28: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( !info || levelWon == atoi( Info_ValueForKey( info, "num" ) ) ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:604:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:605:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char videos[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:614:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi( Info_ValueForKey( videos, key ) ) ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:631:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:632:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char videos[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:645:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi( Info_ValueForKey( videos, key ) ) ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:668:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). level = atoi( Info_ValueForKey( info, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:686:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi( Info_ValueForKey( info, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:754:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char arenaKey[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:755:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scores[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:787:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:788:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char awardData[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_ingame.c:168:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_ingame.c:242:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team = atoi( Info_ValueForKey( info, "t" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_ingame.c:259:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if( atoi( Info_ValueForKey(info,"g_allowVote") )==0 || trap_Cvar_VariableValue("g_gametype")==GT_SINGLE_PLAYER ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_loadconfig.c:72:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char names[NAMEBUFSIZE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_loadconfig.c:213:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s_configs.names,"No Files Found."); data/openarena-0.8.8+dfsg/code/q3_ui/ui_local.h:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_local.h:302:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[10][MAX_MAPNAME_LENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:70:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorMessage[4096]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:255:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:39:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:65:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( str, edit->buffer + prestep, drawLen ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pasteBuffer[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:53:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[NAMEBUFSIZE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fs_game[GAMEBUFSIZE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *descriptionList[MAX_MODS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *fs_gameList[MAX_MODS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:118:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:152:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_password.c:62:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servername[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:98:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelnames[MAX_PLAYERMODELS][128]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelskin[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:392:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:393:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filelist[2048]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:394:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinname[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:461:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelskin[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:527:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char playername[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:528:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char modelname[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:529:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char skinname[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:93:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_barrel.md3" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:99:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_flash.md3" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:903:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:934:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:1002:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:1015:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:1021:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:1050:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:1051:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_players.c:1052:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playersettings.c:73:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerModel[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playersettings.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playersettings.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:136:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[512]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_rankings.c:194:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char password[MAX_EDIT_LINE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_removebots.c:75:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botnames[7][32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_removebots.c:89:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_removebots.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_removebots.c:189:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numPlayers = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_removebots.c:195:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). isBot = atoi( Info_ValueForKey( info, "skill" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_saveconfig.c:78:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char configname[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:50:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:66:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[128]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:67:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverbuff[128]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:129:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_INFO_KEY]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:189:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_INFO_KEY]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_serverinfo.c:190:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:186:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:191:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:192:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[MAX_HOSTNAMELENGTH+3]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:193:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_MAPNAMELENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:200:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gamename[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:209:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_LISTBOXWIDTH+64]; // +60 gives room for color codes... Sago: I need four more data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:253:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char favoriteaddresses[MAX_FAVORITESERVERS][MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:416:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char picname[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:533:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( g_arenaservers.status.string,"Scanning For Servers." ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:550:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(g_arenaservers.status.string,"No Response From Master Server." ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:553:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(g_arenaservers.status.string,"No Servers Found." ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:781:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &g_arenaservers.favoriteaddresses[i], &g_arenaservers.favoriteaddresses[i+1], (g_arenaservers.numfavoriteaddresses - i - 1)* MAX_ADDRESSLENGTH ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:798:6: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &g_favoriteserverlist[i], &g_favoriteserverlist[i+1], (g_numfavoriteservers - i - 1)*sizeof(servernode_t)); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:848:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->numclients = atoi( Info_ValueForKey( info, "clients") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:849:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->humanclients = atoi( Info_ValueForKey( info, "g_humanplayers") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:850:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->needPass = atoi( Info_ValueForKey( info, "g_needpass") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:851:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->maxclients = atoi( Info_ValueForKey( info, "sv_maxclients") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:853:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->minPing = atoi( Info_ValueForKey( info, "minPing") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:854:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->maxPing = atoi( Info_ValueForKey( info, "maxPing") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:872:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). servernodeptr->nettype = atoi(Info_ValueForKey(info, "nettype")); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:875:6: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). i = atoi( Info_ValueForKey( info, "gametype") ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:904:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:937:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char emptyinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:938:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:946:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( templist, g_favoriteserverlist, sizeof(servernode_t)*MAX_FAVORITESERVERS ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:978:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( &g_favoriteserverlist[g_numfavoriteservers], &templist[j], sizeof(servernode_t) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1046:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1047:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1191:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char myargs[32], protocol[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1226:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " ffa" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1230:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " team" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1234:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " tourney" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1238:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " ctf" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1242:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " elimination" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1246:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " ctfelimination" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1250:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " lms" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1254:4: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " dd" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1258:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( myargs, " dom" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1264:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(myargs, " empty"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1268:4: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(myargs, " full"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1324:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char masterstr[2], cvarname[sizeof("sv_master1")]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1376:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(g_arenaservers.status.string,"hit refresh to update"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1541:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char statusbuffer[MAX_STATUSLENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sparena.c:36:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). level = atoi( Info_ValueForKey( arenaInfo, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c:63:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char playername[80]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c:85:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_LISTBOXWIDTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c:86:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char leaguename[MAX_LEAGUENAME]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c:90:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *leaguename_items[MAX_LISTBOXITEMS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c:106:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char s[MAX_LEAGUENAME]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyserver.c:71:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[256]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:93:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char levelPicNames[4][MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:94:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char levelNames[4][16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:101:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerModel[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerPicName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botNames[7][10]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:130:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:155:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char iconName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:171:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bots[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:225:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:274:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). level = atoi( Info_ValueForKey( arenaInfo, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:295:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). level = atoi( Info_ValueForKey( arenaInfo, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:545:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:546:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:721:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:923:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). n = atoi( buf ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_splevel.c:950:19: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). trainingLevel = atoi( Info_ValueForKey( arenaInfo, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:64:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char placeNames[3][64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:78:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char arenainfo[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:215:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:268:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:269:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:301:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:304:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). serverId = atoi( Info_ValueForKey( info, "sv_serverid" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:482:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:483:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:511:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:512:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:517:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). postgameMenuInfo.serverId = atoi( Info_ValueForKey( info, "sv_serverid" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:527:27: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). postgameMenuInfo.level = atoi( Info_ValueForKey( arenainfo, "num" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:529:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). postgameMenuInfo.numClients = atoi( UI_Argv( 1 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:530:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). playerClientNum = atoi( UI_Argv( 2 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:538:36: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). postgameMenuInfo.clientNums[n] = atoi( UI_Argv( 8 + n * 3 + 1 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:539:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). postgameMenuInfo.ranks[n] = atoi( UI_Argv( 8 + n * 3 + 2 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:540:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). postgameMenuInfo.scores[n] = atoi( UI_Argv( 8 + n * 3 + 3 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:550:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). awardValues[AWARD_ACCURACY] = atoi( UI_Argv( 3 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:551:34: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). awardValues[AWARD_IMPRESSIVE] = atoi( UI_Argv( 4 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:552:33: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). awardValues[AWARD_EXCELLENT] = atoi( UI_Argv( 5 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:553:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). awardValues[AWARD_GAUNTLET] = atoi( UI_Argv( 6 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:554:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). awardValues[AWARD_FRAGS] = atoi( UI_Argv( 7 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:555:31: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). awardValues[AWARD_PERFECT] = atoi( UI_Argv( 8 ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:240:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char picname[MAX_MAPSPERPAGE][64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:242:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[MAX_NAMELENGTH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:283:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_startserver.mapname.string, "NO MAPS FOUND" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:471:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mapnamebuffer[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:655:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char picname[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:656:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapname[ MAX_NAMELENGTH ]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:753:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapnamebuffer[32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:754:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerNameBuffers[PLAYER_SLOTS][16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:758:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newBotName[16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:858:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:861:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). timelimit = atoi( s_serveroptions.timelimit.field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:862:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). fraglimit = atoi( s_serveroptions.fraglimit.field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:863:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). flaglimit = atoi( s_serveroptions.flaglimit.field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1297:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bots[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1369:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_serveroptions.playerNameBuffers[n], "Grunt" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1372:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_serveroptions.playerNameBuffers[n], "Merman" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1375:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_serveroptions.playerNameBuffers[n], "Kyonshi" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1378:22: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( s_serveroptions.playerNameBuffers[n], "Skelebot" ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1402:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char picname[64]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1926:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char boticons[MAX_MODELSPERPAGE][MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1927:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botnames[MAX_MODELSPERPAGE][16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1988:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_team.c:102:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_team.c:166:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). gametype = atoi( Info_ValueForKey( info,"g_gametype" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:60:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *bots[9]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:61:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char botNames[9][16]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[256]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:407:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:419:15: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). numPlayers = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:420:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). teamOrdersMenuInfo.gametype = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:430:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). isBot = atoi( Info_ValueForKey( info, "skill" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:540:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). teamOrdersMenuInfo.gametype = atoi( Info_ValueForKey( info, "g_gametype" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_teamorders.c:548:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team = atoi( Info_ValueForKey( info, "t" ) ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:59:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringbuff[1024]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:327:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *builtinResolutions[ ] = data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:344:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *knownRatios[ ][2] = data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:359:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char ratioBuf[ MAX_RESOLUTIONS ][ 8 ]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:363:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char resbuf[ MAX_STRING_CHARS ]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:431:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[ sizeof(ratioBuf[0]) ]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:438:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). w = atoi( str ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:439:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). h = atoi( x ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:674:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char w[ 16 ], h[ 16 ]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:850:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu.c:447:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu.c:450:40: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s_votemenu.g_doWarmupEnabled = atoi(Info_ValueForKey(serverinfo,"g_doWarmup")); data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_custom.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[CUSTOM_MENU_MAX_ENTRIES][32]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_custom.c:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char custominfo[MAX_INFO_STRING], *token,*pointer; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_fraglimit.c:264:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_fraglimit.c:268:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s_votemenu_fraglmit.min = atoi(Info_ValueForKey(serverinfo,"g_voteMinFraglimit")); data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_fraglimit.c:269:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s_votemenu_fraglmit.max = atoi(Info_ValueForKey(serverinfo,"g_voteMaxFraglimit")); data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_gametype.c:328:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING], *gametypeinfo; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_kick.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[SIZE_OF_NAME]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_kick.c:84:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_timelimit.c:263:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverinfo[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_timelimit.c:267:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s_votemenu_Timelmit.min = atoi(Info_ValueForKey(serverinfo,"g_voteMinTimelimit")); data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_timelimit.c:268:35: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). s_votemenu_Timelmit.max = atoi(Info_ValueForKey(serverinfo,"g_voteMaxTimelimit")); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:108:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char oldPath[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:274:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_token[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:275:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char com_parsename[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:297:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:309:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:529:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:562:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( token, "<NULL>" ); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:947:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bigbuffer[32000]; // big, but small enough to fit in PPC stack data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:977:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[2][32000]; // in case va is called by nested functions data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1030:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1031:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char value[2][BIG_INFO_VALUE]; // use two buffers so compares data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1127:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[MAX_INFO_KEY]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1128:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1183:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pkey[BIG_INFO_KEY]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1184:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BIG_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1260:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1300:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newi[BIG_INFO_STRING]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:303:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #define Com_Memcpy memcpy data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:662:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_TOKENLENGTH]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:862:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char string[MAX_CVAR_VALUE_STRING]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:1005:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stringData[MAX_GAMESTATE_CHARS]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:1245:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shaderName[32]; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.h:1251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:710:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/openarena-0.8.8+dfsg/code/qcommon/qcommon.h:726:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char cl_cdkey[34]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:99:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:103:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // tag name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:121:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:140:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:161:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:210:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:211:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:254:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:314:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // polyset name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:315:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:345:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[16]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:350:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char Comp[24]; // MC_COMP_BYTES is in MatComp.h, but don't want to couple data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:368:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:375:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_QPATH]; // model name data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:490:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/qcommon/qfiles.h:535:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/renderer/tr_types.h:134:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_RENDER_STRINGS][MAX_RENDER_STRING_LENGTH]; data/openarena-0.8.8+dfsg/code/renderer/tr_types.h:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char renderer_string[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/renderer/tr_types.h:180:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_string[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/renderer/tr_types.h:181:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version_string[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/renderer/tr_types.h:182:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char extensions_string[BIG_INFO_STRING]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:44:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char com_token[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:48:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char archivedir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:60:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ex_argv[MAX_EX_ARGC]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:68:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:69:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filebase[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:119:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:120:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text2[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:180:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[4096]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:217:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char qdir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:218:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gamedir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:219:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char writedir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:223:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:300:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:314:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:327:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char full[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:341:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char archivename[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:642:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[MAX_PATH]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:649:9: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(fn, mode); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:722:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)buffer)[length] = 0; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:782:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ((char *)buffer)[length] = 0; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:829:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[128]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:884:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (dest, path, src-path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:965:9: [2] (integer) atol: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atol (str); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:1087:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:1107:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( dir, path, ofs - path ); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h:49:28: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. #pragma intrinsic( memset, memcpy ) data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h:82:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char qdir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h:83:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char gamedir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h:84:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char writedir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h:121:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char com_token[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.h:135:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char archivedir[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:31:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char outputFilename[MAX_OS_PATH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:190:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *asmFiles[MAX_ASM_FILES]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:191:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *asmFileNames[MAX_ASM_FILES]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:208:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[MAX_LINE_LENGTH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:210:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[MAX_LINE_LENGTH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:538:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_LINE_LENGTH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:593:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_LINE_LENGTH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:667:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( lineBuffer, data, (p - data) ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:731:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sym[MAX_LINE_LENGTH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:741:2: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sym, token, i ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:764:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( sym, token+i+1, j-i-1 ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:921:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1066:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1316:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imageName[MAX_OS_PATH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1321:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( imageName, ".map" ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1346:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char imageName[MAX_OS_PATH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1355:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( imageName, ".qvm" ); data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1426:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_OS_PATH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1492:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded[MAX_OS_PATH]; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:1550:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( outputFilename, "q3asm" ); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:45:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:96:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:105:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:150:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:179:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char gameList[4096]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:219:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char map[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:220:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:230:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi(Info_ValueForKey(info, "g_gametype")); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:246:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.accuracy = atoi(UI_Argv(3)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:247:24: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.impressives = atoi(UI_Argv(4)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:248:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.excellents = atoi(UI_Argv(5)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:249:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.defends = atoi(UI_Argv(6)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:250:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.assists = atoi(UI_Argv(7)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:251:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.gauntlets = atoi(UI_Argv(8)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:252:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.baseScore = atoi(UI_Argv(9)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:253:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.perfects = atoi(UI_Argv(10)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:254:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.redScore = atoi(UI_Argv(11)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:255:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.blueScore = atoi(UI_Argv(12)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:256:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). time = atoi(UI_Argv(13)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:257:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). newInfo.captures = atoi(UI_Argv(14)); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:346:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader1[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:347:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader2[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:348:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char shader3[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_botInfos[MAX_BOTS]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char *ui_arenaInfos[MAX_ARENAS]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:54:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_TOKEN_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:55:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:88:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy( token, "<NULL>" ); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:110:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_ARENAS_TEXT]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:138:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:139:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:161:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename, "scripts/"); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:233:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_BOTS_TEXT]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:263:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:264:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:284:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(filename, "scripts/"); data/openarena-0.8.8+dfsg/code/ui/ui_local.h:229:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAX_EDIT_LINE]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:663:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *teamMembers[TEAM_MEMBERS]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:690:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *maps[MAPS_PER_TIER]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:701:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:732:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char motd[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:737:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char adrstr[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:738:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:750:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char address[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:751:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *lines[MAX_SERVERSTATUS_LINES][4]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:752:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[MAX_SERVERSTATUS_TEXT]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:753:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pings[MAX_CLIENTS * 3]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:796:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char playerNames[MAX_CLIENTS][MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:797:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamNames[MAX_CLIENTS][MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:813:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *demoList[MAX_DEMOS]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:817:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *movieList[MAX_MOVIES]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:825:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char serverStatusAddress[MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:831:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char findPlayerName[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:832:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foundPlayerServerAddresses[MAX_FOUNDPLAYER_SERVERS][MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:833:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char foundPlayerServerNames[MAX_FOUNDPLAYER_SERVERS][MAX_ADDRESSLENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_local.h:843:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char q3HeadNames[MAX_PLAYERMODELS][64]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:382:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor[0], &color[0], sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:451:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor[0], &color[0], sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:686:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[MAX_MENUFILE]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:995:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lastName[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1283:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1284:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1285:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1325:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1326:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1327:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1535:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1536:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headmodel[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1537:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1564:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1565:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headmodel[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1566:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char team[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1875:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_STRING]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1880:22: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). uiInfo.teamLeader = atoi(Info_ValueForKey(info, "tl")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1881:9: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team = atoi(Info_ValueForKey(info, "t")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1883:10: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). count = atoi( Info_ValueForKey( info, "sv_maxclients" ) ); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1894:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). team2 = atoi(Info_ValueForKey(info, "t")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:1939:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[64]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2015:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2016:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *lines[64]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2906:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2936:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char teamList[4096]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2960:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char movielist[4096]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2992:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demolist[4096]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2993:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demoExt[32]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3037:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3247:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3320:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char out[17]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3501:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3502:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3527:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3537:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3538:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr[MAX_NAME_LENGTH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3663:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3821:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3837:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(uiInfo.serverStatus.motd, "Welcome to Team Arena!"); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3880:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clients = atoi(Info_ValueForKey(info, "g_humanplayers")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3882:39: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). clients = atoi(Info_ValueForKey(info, "clients")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3893:18: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). maxClients = atoi(Info_ValueForKey(info, "sv_maxclients")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3901:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi(Info_ValueForKey(info, "gametype")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4116:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAX_NAME_LENGTH+2]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4117:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char infoString[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4372:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4373:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char hostname[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4374:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char clientBuff[32]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4396:11: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). ping = atoi(Info_ValueForKey(info, "ping")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4409:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). netnames[atoi(Info_ValueForKey(info, "nettype"))] ); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4422:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). game = atoi(Info_ValueForKey(info, "gametype")); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4506:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char info[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5043:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dirlist[2048]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5044:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filelist[2048]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5045:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinname[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5046:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char scratch[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5319:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5397:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char lastLoadingText[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5438:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5496:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dlSizeBuf[64], totalSizeBuf[64], xferRateBuf[64], dlTimeBuf[64]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5571:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5572:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[256]; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5628:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char downloadName[MAX_INFO_VALUE]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:56:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:94:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_barrel.md3" ); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:100:2: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( path, "_flash.md3" ); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1209:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH*2]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1265:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[20000]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1335:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].firstFrame = atoi( token ); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1348:29: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].numFrames = atoi( token ); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1354:30: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). animations[i].loopFrames = atoi( token ); data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1382:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1383:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char skinName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1384:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headModelName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1385:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char headSkinName[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_players.c:1386:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_QPATH]; data/openarena-0.8.8+dfsg/code/ui/ui_public.h:32:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char servername[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_public.h:33:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char updateInfoString[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_public.h:34:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char messageString[MAX_STRING_CHARS]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:83:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memoryPool[MEM_POOL_SIZE]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:157:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char strPool[STRING_POOL_SIZE]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:256:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:258:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:278:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[128]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:280:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string[4096]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:402:8: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). *i = atoi(token); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:508:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1113:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&item->window.rectClient, &rectFrom, sizeof(rectDef_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1114:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&item->window.rectEffects, &rectTo, sizeof(rectDef_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1265:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024], *p; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1301:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char script[1024], *p; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1950:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:1976:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2030:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2780:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[256]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2820:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newColor, &item->window.foreColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2826:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newColor, &parent->disableColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2832:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2834:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2905:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2907:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2950:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3025:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buff[1024]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3048:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor, &item->window.foreColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3075:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor, &item->window.foreColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3098:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor, &item->window.foreColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3221:2: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b[256]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3347:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_nameBind1[32]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3348:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_nameBind2[32]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3369:6: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat( g_nameBind1, " or " ); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3375:2: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(g_nameBind1, "???"); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3392:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor, &item->window.foreColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:3436:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&newColor, &item->window.foreColor, sizeof(vec4_t)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:5021:4: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&item->colorRanges[item->numColors], &color, sizeof(color)); data/openarena-0.8.8+dfsg/code/ui/ui_shared.h:110:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *args[MAX_SCRIPT_ARGS]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.h:201:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvarList[MAX_MULTI_CVARS]; data/openarena-0.8.8+dfsg/code/ui/ui_shared.h:202:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char *cvarStr[MAX_MULTI_CVARS]; data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:64:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:101:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:149:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/cgame/cg_draw.c:246:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(num); data/openarena-0.8.8+dfsg/code/cgame/cg_event.c:208:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (message && strlen(targetName)) { data/openarena-0.8.8+dfsg/code/cgame/cg_main.c:1345:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). i = strlen(cg.spectatorList); data/openarena-0.8.8+dfsg/code/cgame/cg_newdraw.c:1242:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/cgame/cg_players.c:668:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat( teamname, "/" ); data/openarena-0.8.8+dfsg/code/cgame/cg_scoreboard.c:524:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CG_DrawStringExt( 632 - GIANT_WIDTH * strlen(s), y, s, color, qtrue, qtrue, GIANT_WIDTH, GIANT_HEIGHT, 0 ); data/openarena-0.8.8+dfsg/code/cgame/cg_scoreboard.c:530:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CG_DrawStringExt( 632 - GIANT_WIDTH * strlen(s), y, s, color, qtrue, qtrue, GIANT_WIDTH, GIANT_HEIGHT, 0 ); data/openarena-0.8.8+dfsg/code/cgame/cg_scoreboard.c:546:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CG_DrawStringExt( 632 - GIANT_WIDTH * strlen(s), y, s, color, qtrue, qtrue, GIANT_WIDTH, GIANT_HEIGHT, 0 ); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:192:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(temp)<1) data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:457:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(originalShader, o, n-o); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:462:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(newShader, n, t-n); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:470:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(timeOffset, t, o-t); data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:959:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(headModelVoiceChat[i].headmodel)) { data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:975:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(voiceChatLists[i].name)) { data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:979:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(headModelVoiceChat[j].headmodel)) { data/openarena-0.8.8+dfsg/code/cgame/cg_servercmds.c:997:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(headModelVoiceChat[j].headmodel)) { data/openarena-0.8.8+dfsg/code/game/ai_chat.c:80:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:80:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:107:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:107:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:135:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:135:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:165:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:165:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:199:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:199:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:235:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:235:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_chat.c:268:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mapname, Info_ValueForKey( info, "mapname" ), sizeof(mapname)-1); data/openarena-0.8.8+dfsg/code/game/ai_chat.c:750:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. else strcpy(name, ""); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:170:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(goalname)) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:304:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) { data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:419:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name)) { data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:427:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name)) { data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1211:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bs->subteam, teammate, 32); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1233:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bs->subteam)) data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1240:2: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(bs->subteam, ""); data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1254:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bs->subteam)) { data/openarena-0.8.8+dfsg/code/game/ai_cmd.c:1404:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bs->teamleader, teammate, sizeof(bs->teamleader)); data/openarena-0.8.8+dfsg/code/game/ai_dmnet.c:790:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(buf, ""); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1511:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, Info_ValueForKey(buf, "n"), size-1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1530:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(skin, Info_ValueForKey(buf, "model"), size-1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1609:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(ptr, ptr+1, strlen(ptr+1)+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1615:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (str2 > str1) memmove(str1, str2+1, strlen(str2+1)+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1616:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else memmove(str2, str1+1, strlen(str1+1)+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1621:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(name, name+2, strlen(name+2)+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1636:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(ptr, ptr+1, strlen(ptr + 1)+1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:1639:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, name, size-1); data/openarena-0.8.8+dfsg/code/game/ai_dmq3.c:3792:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mapname, Info_ValueForKey( info, "mapname" ), sizeof(mapname)-1); data/openarena-0.8.8+dfsg/code/game/ai_main.c:409:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_main.c:409:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_main.c:422:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_main.c:422:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_main.c:572:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) data/openarena-0.8.8+dfsg/code/game/ai_main.c:572:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) data/openarena-0.8.8+dfsg/code/game/ai_main.c:656:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(bot_interbreedwrite.string)) { data/openarena-0.8.8+dfsg/code/game/ai_main.c:673:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(bot_interbreedchar.string)) return; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1027:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(args, args+1, strlen(args)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1028:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). args[strlen(args)-1] = '\0'; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1033:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(args, args+1, strlen(args)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1034:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). args[strlen(args)-1] = '\0'; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1039:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(args, args+1, strlen(args)); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1040:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). args[strlen(args)-1] = '\0'; data/openarena-0.8.8+dfsg/code/game/ai_main.c:1617:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf)) strcpy(buf, "8"); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1617:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!strlen(buf)) strcpy(buf, "8"); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1623:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("sv_mapChecksum", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1626:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("max_aaslinks", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1629:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("max_levelitems", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1632:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf)) strcpy(buf, "0"); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1632:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!strlen(buf)) strcpy(buf, "0"); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1640:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("nochat", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1643:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("bot_visualizejumppads", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1646:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("forceclustering", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1649:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("forcereachability", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1652:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("forcewrite", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1655:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("aasoptimize", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1658:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("saveroutingcache", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1661:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf)) strcpy(buf, "0"); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1661:20: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. if (!strlen(buf)) strcpy(buf, "0"); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1665:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("basedir", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1668:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("gamedir", buf); data/openarena-0.8.8+dfsg/code/game/ai_main.c:1671:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) trap_BotLibVarSet("homedir", buf); data/openarena-0.8.8+dfsg/code/game/ai_team.c:73:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(bs->teamleader)) return qfalse; data/openarena-0.8.8+dfsg/code/game/ai_team.c:95:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:95:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:153:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:153:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:203:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:203:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1058:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:1058:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(buf) || !strlen(Info_ValueForKey(buf, "n"))) continue; data/openarena-0.8.8+dfsg/code/game/ai_team.c:2141:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(bs->teamleader, netname, sizeof(bs->teamleader)); data/openarena-0.8.8+dfsg/code/game/bg_lib.c:187:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen( const char *string ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.c:332:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy( char *strDest, const char *strSource, size_t count ) { data/openarena-0.8.8+dfsg/code/game/bg_lib.h:86:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t strlen( const char *string ); data/openarena-0.8.8+dfsg/code/game/bg_lib.h:93:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). char *strncpy( char *strDest, const char *strSource, size_t count ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:702:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( string, strlen( string ), f ); data/openarena-0.8.8+dfsg/code/game/g_admin.c:1870:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(g_admin_namelog[ logmatch ]->guid)==0 || strlen(g_admin_namelog[ logmatch ]->ip) ) data/openarena-0.8.8+dfsg/code/game/g_admin.c:1870:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(g_admin_namelog[ logmatch ]->guid)==0 || strlen(g_admin_namelog[ logmatch ]->ip) ) data/openarena-0.8.8+dfsg/code/game/g_admin.c:2444:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ip_match_len = strlen(ip_match); data/openarena-0.8.8+dfsg/code/game/g_admin.c:3434:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( m ) + strlen( g_bfb ) >= 1009 ) data/openarena-0.8.8+dfsg/code/game/g_admin.c:3434:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( m ) + strlen( g_bfb ) >= 1009 ) data/openarena-0.8.8+dfsg/code/game/g_arenas.c:124:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msglen = strlen( msg ); data/openarena-0.8.8+dfsg/code/game/g_arenas.c:128:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msglen += strlen( buf ); data/openarena-0.8.8+dfsg/code/game/g_bot.c:110:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!BG_CanAlloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1)) data/openarena-0.8.8+dfsg/code/game/g_bot.c:110:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!BG_CanAlloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1)) data/openarena-0.8.8+dfsg/code/game/g_bot.c:110:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!BG_CanAlloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1)) data/openarena-0.8.8+dfsg/code/game/g_bot.c:114:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = BG_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/game/g_bot.c:114:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = BG_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/game/g_bot.c:114:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = BG_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/game/g_bot.c:179:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/game/g_bot.c:298:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(netname, value, sizeof(netname)-1); data/openarena-0.8.8+dfsg/code/game/g_bot.c:790:4: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(funname, ""); data/openarena-0.8.8+dfsg/code/game/g_bot.c:923:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/game/g_client.c:1549:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). motdLen = strlen(motd); data/openarena-0.8.8+dfsg/code/game/g_client.c:1681:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(custom_vote_info)) data/openarena-0.8.8+dfsg/code/game/g_cmds.c:98:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(entry); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:156:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(entry); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:348:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tlen = strlen( arg ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1639:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer)-2] = 0; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1671:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer[strlen(buffer)-2] = 0; data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1834:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(arg2)<1) { data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1844:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(customvote.displayname)) data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1959:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(arg2, " "); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1960:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_Argv( i, &arg2[strlen(arg2)], sizeof( arg2 ) - strlen(arg2) ); data/openarena-0.8.8+dfsg/code/game/g_cmds.c:1960:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_Argv( i, &arg2[strlen(arg2)], sizeof( arg2 ) - strlen(arg2) ); data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:154:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( err ) + strlen( line ) > len ) data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:154:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( err ) + strlen( line ) > len ) data/openarena-0.8.8+dfsg/code/game/g_cmds_ext.c:253:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( s2 ) < 1 ) data/openarena-0.8.8+dfsg/code/game/g_fileops.c:75:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( t ) + strlen( s ) >= size ) data/openarena-0.8.8+dfsg/code/game/g_fileops.c:75:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( t ) + strlen( s ) >= size ) data/openarena-0.8.8+dfsg/code/game/g_fileops.c:95:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( buf, strlen( buf ), f ); data/openarena-0.8.8+dfsg/code/game/g_fileops.c:115:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( buf, strlen( buf ), f ); data/openarena-0.8.8+dfsg/code/game/g_killspree.c:229:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( output, stringToSearch, p - stringToSearch ); data/openarena-0.8.8+dfsg/code/game/g_killspree.c:232:99: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Q_snprintf( output + ( p - stringToSearch ), output - stringToSearch, "%s%s", replaceWith, p + strlen( placeHolder ) ); data/openarena-0.8.8+dfsg/code/game/g_main.c:740:76: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). G_LogPrintf("Info: ServerInfo length: %d of %d\n", strlen(serverinfo), MAX_INFO_STRING ); data/openarena-0.8.8+dfsg/code/game/g_main.c:1651:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_FS_Write( string, strlen( string ), level.logFile ); data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:53:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(guid)<32) data/openarena-0.8.8+dfsg/code/game/g_playerstore.c:86:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(guid)<32) data/openarena-0.8.8+dfsg/code/game/g_spawn.c:347:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(string) + 1; data/openarena-0.8.8+dfsg/code/game/g_spawn.c:529:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen( string ); data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:158:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(iplist_final)+strlen(ip) < MAX_CVAR_VALUE_STRING) data/openarena-0.8.8+dfsg/code/game/g_svcmds.c:158:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(iplist_final)+strlen(ip) < MAX_CVAR_VALUE_STRING) data/openarena-0.8.8+dfsg/code/game/g_team.c:1747:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). j = strlen(entry); data/openarena-0.8.8+dfsg/code/game/g_vote.c:39:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(commandStr); data/openarena-0.8.8+dfsg/code/game/g_vote.c:47:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&tempStr[1],commandStr,length); data/openarena-0.8.8+dfsg/code/game/g_vote.c:114:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). maplen = strlen(pointer); data/openarena-0.8.8+dfsg/code/game/g_vote.c:146:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(mapname); data/openarena-0.8.8+dfsg/code/game/g_vote.c:183:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(gametypeStr); data/openarena-0.8.8+dfsg/code/game/g_vote.c:190:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&tempStr[1],gametypeStr,length); data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:746:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/openarena-0.8.8+dfsg/code/q3_ui/ui_atoms.c:752:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/openarena-0.8.8+dfsg/code/q3_ui/ui_cdkey.c:94:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if( strlen( key ) != 16 ) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_challenges.c:376:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(challenges.entryIntString[i],va("%u",challenges.entryInt[i]),MAX_INT_AS_STRING); data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:43:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d GB", data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:43:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d GB", data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:47:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d MB", data/openarena-0.8.8+dfsg/code/q3_ui/ui_connect.c:47:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d MB", data/openarena-0.8.8+dfsg/code/q3_ui/ui_demo2.c:259:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( demoname ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:126:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:126:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:126:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:194:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/q3_ui/ui_gameinfo.c:381:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/q3_ui/ui_loadconfig.c:227:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( configname ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_main.c:328:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(UI_Cvar_VariableString(cvar)) == 0) data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:225:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s_errorMessage.errorMessage)) data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:242:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). UI_DrawString( 640 - (8 * strlen(PRODUCT_VERSION) + 1), 480-14, S_COLOR_WHITE PRODUCT_VERSION, UI_SMALLFONT, color ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:264:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:269:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirptr += dirlen + strlen(descptr) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_menu.c:299:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(s_errorMessage.errorMessage)) data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:42:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:99:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:104:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:123:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pasteLen = strlen( pasteBuffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:148:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:220:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( edit->buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mfield.c:315:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = (strlen( m->generic.name )+1) * w; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:103:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_mods.descriptionPtr += strlen( s_mods.descriptionPtr ) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:104:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_mods.fs_gamePtr += strlen( s_mods.fs_gamePtr ) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:135:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( filename ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:170:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_mods.c:173:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirptr += dirlen + strlen(descptr) + 1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:334:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffptr = s_playermodel.modelnames[modelnum] + strlen("models/players/"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:350:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). maxlen = strlen(pdest+5)+1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:413:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:425:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filelen = strlen(fileptr); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:481:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffptr = s_playermodel.modelnames[i] + strlen("models/players/"); data/openarena-0.8.8+dfsg/code/q3_ui/ui_playermodel.c:505:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). maxlen = strlen(pdest+5)+1; data/openarena-0.8.8+dfsg/code/q3_ui/ui_preferences.c:385:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_preferences.crosshair.generic.left = PREFERENCES_X_POS - ( ( strlen(s_preferences.crosshair.generic.name) + 1 ) * SMALLCHAR_WIDTH ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:397:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(a->generic.name); data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:463:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(rb->generic.name); data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:571:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s->generic.name); data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:786:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s->generic.name) * SMALLCHAR_WIDTH; data/openarena-0.8.8+dfsg/code/q3_ui/ui_qmenu.c:795:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l = strlen(str); data/openarena-0.8.8+dfsg/code/q3_ui/ui_rankings.c:140:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( f->field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_rankings.c:164:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( f->field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_rankings.c:211:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen( f->field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_servers2.c:1273:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(protocol)) { data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyleague.c:152:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(s_specifyleague.rankname.field.buffer)) != 0)) data/openarena-0.8.8+dfsg/code/q3_ui/ui_specifyserver.c:83:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buff+strlen(buff), 128, ":%s", s_specifyserver.port.field.buffer ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_sppostgame.c:488:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( name ); data/openarena-0.8.8+dfsg/code/q3_ui/ui_startserver.c:1725:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s_serveroptions.botSkill.generic.x = 32 + (strlen(s_serveroptions.botSkill.generic.name) + 2 ) * SMALLCHAR_WIDTH; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:211:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s_driverinfo.strings[i]); data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:852:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf)+1] = 0; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:853:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(buf)] = 'x'; data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:854:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_Cvar_VariableStringBuffer("r_customheight", buf+strlen(buf), sizeof(buf)-strlen(buf)); data/openarena-0.8.8+dfsg/code/q3_ui/ui_video.c:854:82: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). trap_Cvar_VariableStringBuffer("r_customheight", buf+strlen(buf), sizeof(buf)-strlen(buf)); data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_custom.c:108:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(text)<1) data/openarena-0.8.8+dfsg/code/q3_ui/ui_votemenu_kick.c:89:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(playerinfo) ) { data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:66:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(name)-1; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:90:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(out)-1; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:115:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:750:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy( dest, src, destsize-1 ); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:843:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). l1 = strlen( dest ); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:864:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(find); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1000:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen( s ); data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1040:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1131:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1165:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(start, s, strlen(s) + 1); // remove this part data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1187:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1263:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= MAX_INFO_STRING ) { data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1277:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!value || !strlen(value)) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1282:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newi) + strlen(s) >= MAX_INFO_STRING) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1282:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newi) + strlen(s) >= MAX_INFO_STRING) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1303:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen( s ) >= BIG_INFO_STRING ) { data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1317:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!value || !strlen(value)) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1322:6: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newi) + strlen(s) >= BIG_INFO_STRING) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1322:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(newi) + strlen(s) >= BIG_INFO_STRING) data/openarena-0.8.8+dfsg/code/qcommon/q_shared.c:1345:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for( i = 0; i < strlen( set ); i++ ) data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:237:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(BASEDIRNAME); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:238:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (c=path+strlen(path)-1 ; c != path ; c--) data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:256:4: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (qdir, path, c+len+count-path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:258:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( qdir ); i++ ) data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:269:6: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (gamedir, path, c+1-path); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:271:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( i = 0; i < strlen( gamedir ); i++ ) data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:281:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if ( writedir[strlen( writedir )-1] != '/' ) data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:283:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writedir[strlen( writedir )] = '/'; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:284:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writedir[strlen( writedir )+1] = 0; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:357:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). b = malloc(strlen(s)+1); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:400:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (out, "\\"); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:403:4: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat (out, "/"); data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:814:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:843:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path)-1; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:853:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(path)-1; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:876:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:892:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/openarena-0.8.8+dfsg/code/tools/asm/cmdlib.c:911:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). src = path + strlen(path) - 1; data/openarena-0.8.8+dfsg/code/tools/asm/q3asm.c:703:2: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(token, q, p - q); data/openarena-0.8.8+dfsg/code/ui/ui_atoms.c:193:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(gameFile); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:93:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:93:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:93:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). infos[count] = UI_Alloc(strlen(info) + strlen("\\num\\") + strlen(va("%d", MAX_ARENAS)) + 1); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:160:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/ui/ui_gameinfo.c:283:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:302:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:337:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:383:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:452:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:550:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(text); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2588:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(netSources[ui_netSource.integer])<1) data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2592:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(strlen(netSources[ui_netSource.integer])<1) data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2916:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen( dirptr ) + 1; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2920:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirptr += dirlen + strlen(descptr) + 1; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2945:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( teamName ); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:2972:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( moviename ); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3009:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen( demoname ); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3010:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!Q_stricmp(demoname + len - strlen(demoExt), demoExt)) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3011:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). demoname[len-strlen(demoExt)] = '\0'; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3326:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buff) == CDKEY_LEN) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3509:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) > 0 && strlen(addr) > 0) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3509:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) > 0 && strlen(addr) > 0) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3531:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(addr) > 0) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3544:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) > 0 && strlen(addr) > 0) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3544:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) > 0 && strlen(addr) > 0) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3835:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(uiInfo.serverStatus.motd); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3838:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(uiInfo.serverStatus.motd); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:3982:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ( strlen(serverStatusCvars[i].altName) ) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4068:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(&info->pings[len]) + 1; data/openarena-0.8.8+dfsg/code/ui/ui_main.c:4131:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!strlen(uiInfo.findPlayerName)) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5061:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = strlen(dirptr); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5073:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). filelen = strlen(fileptr); data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5345:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf)) { data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5403:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d GB", data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5403:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d GB", data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5407:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d MB", data/openarena-0.8.8+dfsg/code/ui/ui_main.c:5407:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Com_sprintf( buf+strlen(buf), bufsize-strlen(buf), ".%02d MB", data/openarena-0.8.8+dfsg/code/ui/ui_main.c:6069:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(ptr)) { data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:187:8: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(p); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2039:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buff); data/openarena-0.8.8+dfsg/code/ui/ui_shared.c:2939:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buff, start, p-start+1); ANALYSIS SUMMARY: Hits = 2026 Lines analyzed = 150613 in approximately 3.38 seconds (44622 lines/second) Physical Source Lines of Code (SLOC) = 102276 Hits@level = [0] 13 [1] 294 [2] 1449 [3] 150 [4] 132 [5] 1 Hits@level+ = [0+] 2039 [1+] 2026 [2+] 1732 [3+] 283 [4+] 133 [5+] 1 Hits/KSLOC@level+ = [0+] 19.9363 [1+] 19.8091 [2+] 16.9346 [3+] 2.76702 [4+] 1.3004 [5+] 0.00977746 Dot directories skipped = 1 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.