News
Microsoft suffered a breach of its internal database for tracking bugs in 2013, according to a new report.
The Wild Neutron hacking group gained access to an internal database Microsoft uses to track software vulnerabilities. David Bisson reports.
Hackers broke into Microsoft's secret, internal bug-tracking database and stole information related to vulnerabilities that were exploited in later attacks. But the software developer never ...
A Romanian bug hunter has found three flaws in Google's official bug tracker, one of which could have been used to exposed sensitive vulnerabilities to unauthorized intruders.
It seems that the database containing descriptions of critical and unfixed bugs and/or vulnerabilities in some of the most widely used software in the world, including the Windows operating system ...
For example, if you're a programmer and your to-do list is filled with loads of bug fix reports, you'll want to transfer those to a bug tracking database. That's what those tools are used for.
During a transfer of data from a testing server, database dump files containing email addresses and encrypted passwords of roughly 97,000 users of a test build for Bugzilla bug-tracking software ...
An attacker stole security-sensitive vulnerability information from the Mozilla's Bugzilla bug tracking system and probably used it to attack Firefox users, the maker of the open-source Firefox ...
Although all the bugs uncovered during RC1 testing have been fixed, several outstanding issues remain, according to Bugzilla, Mozilla’s bug-tracking database and management system.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results