text
stringlengths
0
834k
echo --server : Path to the folder whare Arma 3 Server is installed.
echo.
echo If any of the arguments passed by these parameters contains spaces or any
echo windows spetials characters such as '^^' the argument must be quoted.
echo.
echo.
echo The mods file list txt must contain only one mod ID per line
echo and no extra line or extra space.
echo To Skip a line the line must start with '--'.
echo.
echo Exemple:
echo.
echo modlist.txt
echo --CUP
echo 12345671
echo --Generic weapon mod
echo --125412
echo --I love this mod
echo 69696969
echo.
echo.
pause
goto :eof
",22.9612068966,105,0.5395156749
236,d022326b8c28501f438e8cc366ad85230d474171,2164,cmd,Batchfile,132101/132101.cmd,enforce1/VulnerabilityRemediation,51d9f49ae8da6089d05e1f3088c068bc0a077446,['Unlicense'],1.0,2021-05-07T01:37:49.000Z,2021-05-07T01:37:49.000Z,132101/132101.cmd,jessewolcott/VulnerabilityRemediation,51d9f49ae8da6089d05e1f3088c068bc0a077446,['Unlicense'],,,,132101/132101.cmd,jessewolcott/VulnerabilityRemediation,51d9f49ae8da6089d05e1f3088c068bc0a077446,['Unlicense'],,,,":: Windows Speculative Execution Configuration Check (132101)
:: SPECTRE / MELTDOWN
:: Synopsis
:: The remote host has not properly mitigated a series of speculative execution vulnerabilities.
:: Description
:: The remote host has not properly mitigated a series of known speculative execution vulnerabilities. It, therefore, may be affected by :
:: - Branch Target Injection (BTI) (CVE-2017-5715)
:: - Bounds Check Bypass (BCB) (CVE-2017-5753)
:: - Rogue Data Cache Load (RDCL) (CVE-2017-5754)
:: - Rogue System Register Read (RSRE) (CVE-2018-3640)
:: - Speculative Store Bypass (SSB) (CVE-2018-3639)
:: - L1 Terminal Fault (L1TF) (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646)
:: - Microarchitectural Data Sampling Uncacheable Memory (MDSUM) (CVE-2019-11091)
:: - Microarchitectural Store Buffer Data Sampling (MSBDS) (CVE-2018-12126)
:: - Microarchitectural Load Port Data Sampling (MLPDS) (CVE-2018-12127)
:: - Microarchitectural Fill Buffer Data Sampling (MFBDS) (CVE-2018-12130)
:: - TSX Asynchronous Abort (TAA) (CVE-2019-11135)
:: Solution
:: Apply vendor recommended settings.
:: Recommended Settings 2:
:: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\
:: FeatureSettingsOverrideMask: 0x00000003 (3)
:: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\
:: FeatureSettingsOverride: 0x00000048 (72)
:: CVEs Covered:
:: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3615, CVE-2018-3620,
:: CVE-2018-3639, CVE-2018-3646, CVE-2018-11091, CVE-2018-12126, CVE-2018-12127,
:: CVE-2018-12130, CVE-2019-11135
:: Note: Hyper-Threading enabled.
:: Note: Most protections enabled by default on clients. Required for CVE-2018-3639.
:: NOTE: This assumes hyper-threading remains enabled. Your mileage may vary if you run with HT Disabled. This is not tested on Windows 7 or 8!
reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management"" /v FeatureSettingsOverride /t REG_DWORD /d 00002048 /f
reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management"" /v FeatureSettingsOverrideMask /t REG_DWORD /d 00000003 /f
",54.1,154,0.7536968577
237,d0224c79227bdb9cbf461670222613ae202880e4,1631,bat,Batchfile,bump.bat,Soldat/polyworks,820e00e50cc9daabed513d0c2036f59b4a3621da,['MIT'],18.0,2016-08-06T18:36:11.000Z,2022-02-13T10:16:44.000Z,bump.bat,Soldat/polyworks,820e00e50cc9daabed513d0c2036f59b4a3621da,['MIT'],14.0,2016-07-06T09:53:23.000Z,2022-02-15T20:10:22.000Z,bump.bat,Soldat/polyworks,820e00e50cc9daabed513d0c2036f59b4a3621da,['MIT'],6.0,2017-06-19T01:46:27.000Z,2021-08-12T05:25:42.000Z,":: Bump batch script
::
:: Updates the version numbers for this project
:: Requires sed to work
@ECHO OFF
PUSHD .
sed >NUL 2>&1
IF %ERRORLEVEL% == 9009 (
ECHO ERROR: Cannot find sed
GOTO END
)
IF ""%1"" == """" GOTO USAGE
SET BUMP_VERSION=%1
ECHO _START_%BUMP_VERSION%_END_ | sed -nb ""/^_START_[0-9]\+\(\.[0-9]\+\)*_END_/!{q100}""
IF ERRORLEVEL 1 GOTO USAGE
SET BUMP_VERSION=%1
SET BUMP_COMMAND_MAJOR='ECHO _START_%BUMP_VERSION%_END_ ^^^| sed -b ""s/^_START_\([0-9]\+\)\(\.[0-9]\+\)*_END_/\1/""'
SET BUMP_COMMAND_MINOR='ECHO _START_%BUMP_VERSION%_END_ ^^^| sed -b ""s/^_START_[0-9]\+\.\([0-9]\+\)\(\.[0-9]\+\)*_END_/\1/""'
SET BUMP_COMMAND_REVISION='ECHO _START_%BUMP_VERSION%_END_ ^^^| sed -b ""s/^_START_[0-9]\+\.[0-9]\+\.[0-9]\+\.\([0-9]\+\)\(\.[0-9]\+\)*_END_/\1/""'
FOR /F ""tokens=*"" %%i IN (%BUMP_COMMAND_MAJOR%) DO SET BUMP_VERSION_MAJOR=%%i
FOR /F ""tokens=*"" %%i IN (%BUMP_COMMAND_MINOR%) DO SET BUMP_VERSION_MINOR=%%i
FOR /F ""tokens=*"" %%i IN (%BUMP_COMMAND_REVISION%) DO SET BUMP_VERSION_REVISION=%%i
CD /D ""%~dp0""
:: Add more matches here
sed -bi ""s/^!define PRODUCT_VERSION \"".*\""/!define PRODUCT_VERSION \""%BUMP_VERSION%\""/g"" pwinstall/pw.nsi
sed -bi ""s/^Soldat Polyworks [0-9]\+\(\.[0-9]\+\)*/Soldat Polyworks %BUMP_VERSION%/g"" pwinstall/readme.txt