Gtkwave
by Tonybybell
Standard maintenance is sufficient
Gtkwave has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
0.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 82 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2023-37574 | 7.8 | 0.2% | — |
| CVE-2023-37575 | 7.8 | 0.2% | — |
| CVE-2023-37447 | 7.8 | 0.2% | — |
| CVE-2023-37577 | 7.8 | 0.1% | — |
| CVE-2023-39444 | 7.8 | 0.1% | — |
| CVE-2023-37442 | 7.8 | 0.1% | — |
| CVE-2023-39317 | 7.8 | 0.1% | — |
| CVE-2023-35960 | 7.8 | 0.1% | — |
| CVE-2023-35962 | 7.8 | 0.1% | — |
| CVE-2023-35963 | 7.8 | 0.1% | — |
| CVE-2023-35959 | 7.8 | 0.1% | — |
| CVE-2023-37573 | 7.8 | 0.1% | — |
| CVE-2023-37445 | 7.8 | 0.1% | — |
| CVE-2023-38619 | 7.8 | 0.1% | — |
| CVE-2023-38618 | 7.8 | 0.1% | — |
| CVE-2023-37576 | 7.8 | 0.1% | — |
| CVE-2023-37443 | 7.8 | 0.1% | — |
| CVE-2023-37578 | 7.8 | 0.1% | — |
| CVE-2023-37444 | 7.8 | 0.1% | — |
| CVE-2023-39443 | 7.8 | 0.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.