Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8276
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-11 May, 2026 | 05:15
Updated At-11 May, 2026 | 05:15
Rejected At-
▼CVE Numbering Authority (CNA)
bettercap MySQL Server mysql_server.go integer coercion

A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.

Affected Products
Vendor
n/a
Product
bettercap
Modules
  • MySQL Server
Versions
Affected
  • 2.41.0
  • 2.41.1
  • 2.41.2
  • 2.41.3
  • 2.41.4
  • 2.41.5
Problem Types
TypeCWE IDDescription
CWECWE-192Integer Coercion Error
CWECWE-189Numeric Error
Type: CWE
CWE ID: CWE-192
Description: Integer Coercion Error
Type: CWE
CWE ID: CWE-189
Description: Numeric Error
Metrics
VersionBase scoreBase severityVector
4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
3.13.7LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3.03.7LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2.02.6N/A
AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Version: 3.0
Base score: 3.7
Base severity: LOW
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
Version: 2.0
Base score: 2.6
Base severity: N/A
Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
dapickle (VulDB User)
Timeline
EventDate
Advisory disclosed2026-05-10 00:00:00
VulDB entry created2026-05-10 02:00:00
VulDB entry last update2026-05-10 18:10:55
Event: Advisory disclosed
Date: 2026-05-10 00:00:00
Event: VulDB entry created
Date: 2026-05-10 02:00:00
Event: VulDB entry last update
Date: 2026-05-10 18:10:55
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/vuln/362573
vdb-entry
https://vuldb.com/vuln/362573/cti
signature
permissions-required
https://vuldb.com/submit/811163
third-party-advisory
https://github.com/bettercap/bettercap/issues/1265
issue-tracking
https://github.com/bettercap/bettercap/pull/1266
issue-tracking
patch
https://github.com/bettercap/bettercap/issues/1265#issue-4287957382
exploit
issue-tracking
https://github.com/bettercap/bettercap/commit/0eaa375c5e5446bfba94a290eff92967a5deac9e
patch
https://github.com/bettercap/bettercap/
product
Hyperlink: https://vuldb.com/vuln/362573
Resource:
vdb-entry
Hyperlink: https://vuldb.com/vuln/362573/cti
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/submit/811163
Resource:
third-party-advisory
Hyperlink: https://github.com/bettercap/bettercap/issues/1265
Resource:
issue-tracking
Hyperlink: https://github.com/bettercap/bettercap/pull/1266
Resource:
issue-tracking
patch
Hyperlink: https://github.com/bettercap/bettercap/issues/1265#issue-4287957382
Resource:
exploit
issue-tracking
Hyperlink: https://github.com/bettercap/bettercap/commit/0eaa375c5e5446bfba94a290eff92967a5deac9e
Resource:
patch
Hyperlink: https://github.com/bettercap/bettercap/
Resource:
product
Details not found