ALL WE HAVE TO DO IS STAND UP~ AND THEIR LITTLE GAME IS OVER!



Sunday, 28 August 2022

Robert F Kennedy

 Copied

News from

Switzerland 


Supreme Court ruling hardly anyone noticed that Robert F. Kennedy Jr. won the case against all the pharmaceutical lobbyists. Covid vaccines are not vaccines. In the ruling, the Supreme Court confirms that the damage caused by Covid mRNA gene therapies is irreparable. As the Supreme Court is the highest court in the United States, there are no further appeals and the appeals have been exhausted.  Robert F. Kennedy emphasised in an initial statement that this was a success that was only possible thanks to the international cooperation of a large number of lawyers and scientists. Of course, this judgment opens up something internationally, especially here in Switzerland, this judgment should make waves, because Switzerland has a special position here with its federal constitution.  On the one hand, the Nuremberg Codex in the constitution with Article 118b, and the misuse of genetic engineering in humans is prohibited in Switzerland, according to Article 119 of the Federal Constitution.  This is supplemented by Article 230bis of the Criminal Code,  ... Thus, the perpetrators risk up to 10 years in prison.  But this judgment should also make the rest of the world sit up and take notice, because the Nuremberg Code is internationally valid and is also included in Article 7 of the International Covenant on Civil and Political Rights. In the case of criminal charges, the statement must include a reference to the Contergan scandal in order to give special weight to the importance of this charge. The policy is thus facing a hot autumn. Source: https://boersenwolf.blogspot.com/2022/08/supreme-court-urteil-bestatigt-covid.html  🙏🏻🙏🏻🙏🏻 no media is talking about it, neither in Switzerland nor in Europe. It's up to us to spread the word 🌹🌹🌹

Friday, 12 August 2022

Astrix - Deep Jungle Walk

PREJUDISM IN CANADA

 I'm tired of listening to Canadians bash immmigrants in Canada.

No matter where these people came from-they are Canadians now too.

Where do you all think we came from as well?

Canada is NOT falling apart despite what some say. If anything-we are stronger.We are still on the map.

Spreading Hate is above us.

They fought for freedom in supressed countries.They have experience,and they came to us.Embrace them for they are here to fight.For themselves,for Canada,for Freedom.

We are lucky to have them.Show a better example.

For we have more Warriors.





Monday, 8 August 2022

These Little Ones

Volunerable Routers!

 Patch now! Cisco VPN routers are vulnerable to remote control

Posted: August 7, 2022 by Pieter Arntz

Cisco has released a security advisory about several vulnerabilities in the Cisco Small Business RV series routers, covering the RV160, RV260, RV340, and RV345.


There are no workarounds available that address these vulnerabilities, so you need to patch.


Vulnerabilities

The vulnerabilities are dependent on one another—exploitation of one of the vulnerabilities may be required to exploit another vulnerability.


Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). You will find the ones included in these updates listed below.


CVE-2022-20842

CVE-2022-20842 is a vulnerability in the web-based management interface of the Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers. Exploitation of the vulnerability could allow an unauthenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition.


This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a DoS condition.


CVE-2022-20827

CVE-2022-20827 is a vulnerability in the web filter database update feature of Cisco Small Business RV160, RV260, RV340, and RV345 series routers. Exploitation of the vulnerability could allow an unauthenticated, remote attacker to perform a command injection and execute commands on the underlying operating system with root privileges.


This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting crafted input to the web filter database update feature.


CVE-2022-20841

CVE-2022-20841 is a vulnerability in the Open Plug and Play (PnP) module of Cisco Small Business RV160, RV260, RV340, and RV345 series routers. Exploitation of the vulnerability could allow an unauthenticated, remote attacker to inject and execute arbitrary commands on the underlying operating system.


This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system. To exploit this vulnerability, an attacker must leverage a machine-in-the-middle position or have an established foothold on a specific network device connected to the affected router.


Input validation

After reading the vulnerability descriptions above you may wonder what “input validation” means, since the absence of it seems to be one of the underlying issues.


As you probably suspected, input validation is the name for the checks that are done on data being added to a system. It is necessary to ensure only properly formed data enters the workflow in an information system. When a system does not properly validate its inputs, it gives threat actors a chance to attempt several attacks, depending on the type of system.


The most common type is SQL injection, an attack used against databases. SQL commands are a mixture of actions (code) and things being acted upon (data). The external inputs that feed into SQL commands should only ever be interpreted as data. If they are interpreted as code then an attacker can inject input that changes the behaviour of an application’s SQL commands.


Insufficient input validation could allow an attacker to execute SQL commands that could destroy your database or provide the attacker with data stored in the database.


Mitigation

There are no workarounds that address these vulnerabilities but Cisco has released free software updates for them. Cisco states it is not aware of any public announcements or malicious use of the vulnerabilities. So, now is your chance to install those updates before that changes.


A list of releases in which these vulnerabilities have been fixed is available in the Cisco Security Advisory.


Stay safe, everyone!