The phpMyAdmin development team reports:
XSS vulnerability in SQL parser.
Using a crafted SQL query, it is possible to trigger an XSS
attack through the SQL query page.
We consider this vulnerability to be non-critical.
Multiple XSS vulnerabilities.
By sending a specially crafted URL as part of the HOST
header, it is possible to trigger an XSS attack.
A weakness was found that allows an XSS attack with Internet
Explorer versions older than 8 and Safari on Windows using a
specially crafted URL.
Using a crafted SQL query, it is possible to trigger an XSS
attack through the SQL query page.
Using a crafted parameter value, it is possible to trigger
an XSS attack in user accounts page.
Using a crafted parameter value, it is possible to trigger
an XSS attack in zoom search page.
We consider this vulnerability to be non-critical.
Multiple XSS vulnerabilities.
With a crafted table/column name it is possible to trigger
an XSS attack in the database normalization page.
With a crafted parameter it is possible to trigger an XSS
attack in the database structure page.
With a crafted parameter it is possible to trigger an XSS
attack in central columns page.
We consider this vulnerability to be non-critical.
Vulnerability allowing man-in-the-middle attack on API
call to GitHub.
A vulnerability in the API call to GitHub can be exploited
to perform a man-in-the-middle attack.
We consider this vulnerability to be serious.