The phpMyAdmin development team reports:
	  It was possible to manipulate the PHP session superglobal using
	    some of the Swekey authentication code.  This could open a path
	    for other attacks.
	
	  An unsanitized key from the Servers array is written in a comment
	    of the generated config.  An attacker can modify this key by
	    modifying the SESSION superglobal array.  This allows the attacker
	    to close the comment and inject code.
	
	  Through a possible bug in PHP running on Windows systems a NULL
	    byte can truncate the pattern string allowing an attacker to
	    inject the /e modifier causing the preg_replace function to
	    execute its second argument as PHP code.
	
	  Fixed filtering of a file path in the MIME-type transformation
	    code, which allowed for directory traversal.