Search for vulnerabilities
Vulnerability details: VCID-49ve-fmbg-dfax
Vulnerability ID VCID-49ve-fmbg-dfax
Aliases CVE-2016-7098
Summary
Status Published
Exploitability 2.0
Weighted Severity 1.3
Risk 2.6
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.03652 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.05958 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
epss 0.06305 https://api.first.org/data/v1/epss?cve=CVE-2016-7098
cvssv2 2.6 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Data source Exploit-DB
Date added Nov. 24, 2016
Description GNU Wget < 1.18 - Access List Bypass / Race Condition
Ransomware campaign use Known
Source publication date Nov. 24, 2016
Exploit type remote
Platform multiple
Source update date Nov. 24, 2016
Source URL https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.87425
EPSS Score 0.03652
Published At Aug. 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:40:51.537650+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/3464-2/ 37.0.0