EMV, also known as "Chip and PIN", is the leading system for card payments world- wide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication protocol. This protocol requires point-of-sale (POS) terminals or ATMs to generate a nonce, called the unpredictable number, for each transaction to ensure it is fresh. The authors have discovered that some EMV implementers have merely used counters, timestamps or home-grown algorithms to supply this number. This exposes them to a "pre-play" attack which is indistinguishable from card cloning from the standpoint of the logs available to the card-issuing bank, and can be carried out even if it is impossible to clone a card physically (in the sense of extracting the key material and loading it into another card).
f84ee2e08154a6b99c6a080b531ba266efec1a3a793f9705959e779bb106cd3e
An attacker, who is able to register a specially crafted username on a Wordpress 2.5 installation, is able to generate authentication cookies for other chosen accounts. This is not good.
876cdd0842aabef73fce903cefeff54e982752b45466e8303ee3099282ca4b3e
Wordpress versions 1.5 through 2.3.1 suffer from a cookie authentication vulnerability.
dcf620597516557871bd390192f9dd05e32ea32acc9591a2243559cb230b97ad