CVE-2026-8276
LOW
2,9
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW
3,7
Source: [email protected]
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW
2,6
Source: [email protected]
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial
Description
AI Translation Available
A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.
192
Integer Coercion Error
IncompleteCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Other
Potential Impacts:
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Crash, Exit, Or Restart
Execute Unauthorized Code Or Commands
Other
Applicable Platforms
Languages:
C, C#, C++, Java
https://github.com/bettercap/bettercap/
https://github.com/bettercap/bettercap/commit/0eaa375c5e5446bfba94a290eff92967a…
https://github.com/bettercap/bettercap/issues/1265
https://github.com/bettercap/bettercap/issues/1265#issue-4287957382
https://github.com/bettercap/bettercap/pull/1266
https://vuldb.com/submit/811163
https://vuldb.com/vuln/362573
https://vuldb.com/vuln/362573/cti