text stringlengths 0 834k |
|---|
echo --server : Path to the folder whare Arma 3 Server is installed. |
echo. |
echo If any of the arguments passed by these parameters contains spaces or any |
echo windows spetials characters such as '^^' the argument must be quoted. |
echo. |
echo. |
echo The mods file list txt must contain only one mod ID per line |
echo and no extra line or extra space. |
echo To Skip a line the line must start with '--'. |
echo. |
echo Exemple: |
echo. |
echo modlist.txt |
echo --CUP |
echo 12345671 |
echo --Generic weapon mod |
echo --125412 |
echo --I love this mod |
echo 69696969 |
echo. |
echo. |
pause |
goto :eof |
",22.9612068966,105,0.5395156749 |
236,d022326b8c28501f438e8cc366ad85230d474171,2164,cmd,Batchfile,132101/132101.cmd,enforce1/VulnerabilityRemediation,51d9f49ae8da6089d05e1f3088c068bc0a077446,['Unlicense'],1.0,2021-05-07T01:37:49.000Z,2021-05-07T01:37:49.000Z,132101/132101.cmd,jessewolcott/VulnerabilityRemediation,51d9f49ae8da6089d05e1f3088c068bc0a077446,['Unlicense'],,,,132101/132101.cmd,jessewolcott/VulnerabilityRemediation,51d9f49ae8da6089d05e1f3088c068bc0a077446,['Unlicense'],,,,":: Windows Speculative Execution Configuration Check (132101) |
:: SPECTRE / MELTDOWN |
:: Synopsis |
:: The remote host has not properly mitigated a series of speculative execution vulnerabilities. |
:: Description |
:: The remote host has not properly mitigated a series of known speculative execution vulnerabilities. It, therefore, may be affected by : |
:: - Branch Target Injection (BTI) (CVE-2017-5715) |
:: - Bounds Check Bypass (BCB) (CVE-2017-5753) |
:: - Rogue Data Cache Load (RDCL) (CVE-2017-5754) |
:: - Rogue System Register Read (RSRE) (CVE-2018-3640) |
:: - Speculative Store Bypass (SSB) (CVE-2018-3639) |
:: - L1 Terminal Fault (L1TF) (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646) |
:: - Microarchitectural Data Sampling Uncacheable Memory (MDSUM) (CVE-2019-11091) |
:: - Microarchitectural Store Buffer Data Sampling (MSBDS) (CVE-2018-12126) |
:: - Microarchitectural Load Port Data Sampling (MLPDS) (CVE-2018-12127) |
:: - Microarchitectural Fill Buffer Data Sampling (MFBDS) (CVE-2018-12130) |
:: - TSX Asynchronous Abort (TAA) (CVE-2019-11135) |
:: Solution |
:: Apply vendor recommended settings. |
:: Recommended Settings 2: |
:: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ |
:: FeatureSettingsOverrideMask: 0x00000003 (3) |
:: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ |
:: FeatureSettingsOverride: 0x00000048 (72) |
:: CVEs Covered: |
:: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3615, CVE-2018-3620, |
:: CVE-2018-3639, CVE-2018-3646, CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, |
:: CVE-2018-12130, CVE-2019-11135 |
:: Note: Hyper-Threading enabled. |
:: Note: Most protections enabled by default on clients. Required for CVE-2018-3639. |
:: NOTE: This assumes hyper-threading remains enabled. Your mileage may vary if you run with HT Disabled. This is not tested on Windows 7 or 8! |
reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management"" /v FeatureSettingsOverride /t REG_DWORD /d 00002048 /f |
reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management"" /v FeatureSettingsOverrideMask /t REG_DWORD /d 00000003 /f |
",54.1,154,0.7536968577 |
237,d0224c79227bdb9cbf461670222613ae202880e4,1631,bat,Batchfile,bump.bat,Soldat/polyworks,820e00e50cc9daabed513d0c2036f59b4a3621da,['MIT'],18.0,2016-08-06T18:36:11.000Z,2022-02-13T10:16:44.000Z,bump.bat,Soldat/polyworks,820e00e50cc9daabed513d0c2036f59b4a3621da,['MIT'],14.0,2016-07-06T09:53:23.000Z,2022-02-15T20:10:22.000Z,bump.bat,Soldat/polyworks,820e00e50cc9daabed513d0c2036f59b4a3621da,['MIT'],6.0,2017-06-19T01:46:27.000Z,2021-08-12T05:25:42.000Z,":: Bump batch script |
:: |
:: Updates the version numbers for this project |
:: Requires sed to work |
@ECHO OFF |
PUSHD . |
sed >NUL 2>&1 |
IF %ERRORLEVEL% == 9009 ( |
ECHO ERROR: Cannot find sed |
GOTO END |
) |
IF ""%1"" == """" GOTO USAGE |
SET BUMP_VERSION=%1 |
ECHO _START_%BUMP_VERSION%_END_ | sed -nb ""/^_START_[0-9]\+\(\.[0-9]\+\)*_END_/!{q100}"" |
IF ERRORLEVEL 1 GOTO USAGE |
SET BUMP_VERSION=%1 |
SET BUMP_COMMAND_MAJOR='ECHO _START_%BUMP_VERSION%_END_ ^^^| sed -b ""s/^_START_\([0-9]\+\)\(\.[0-9]\+\)*_END_/\1/""' |
SET BUMP_COMMAND_MINOR='ECHO _START_%BUMP_VERSION%_END_ ^^^| sed -b ""s/^_START_[0-9]\+\.\([0-9]\+\)\(\.[0-9]\+\)*_END_/\1/""' |
SET BUMP_COMMAND_REVISION='ECHO _START_%BUMP_VERSION%_END_ ^^^| sed -b ""s/^_START_[0-9]\+\.[0-9]\+\.[0-9]\+\.\([0-9]\+\)\(\.[0-9]\+\)*_END_/\1/""' |
FOR /F ""tokens=*"" %%i IN (%BUMP_COMMAND_MAJOR%) DO SET BUMP_VERSION_MAJOR=%%i |
FOR /F ""tokens=*"" %%i IN (%BUMP_COMMAND_MINOR%) DO SET BUMP_VERSION_MINOR=%%i |
FOR /F ""tokens=*"" %%i IN (%BUMP_COMMAND_REVISION%) DO SET BUMP_VERSION_REVISION=%%i |
CD /D ""%~dp0"" |
:: Add more matches here |
sed -bi ""s/^!define PRODUCT_VERSION \"".*\""/!define PRODUCT_VERSION \""%BUMP_VERSION%\""/g"" pwinstall/pw.nsi |
sed -bi ""s/^Soldat Polyworks [0-9]\+\(\.[0-9]\+\)*/Soldat Polyworks %BUMP_VERSION%/g"" pwinstall/readme.txt |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.