What is the "libgdk-win32-2.0-0.dll" ?

Our database contains 267 different files for filename libgdk-win32-2.0-0.dll . You can also check most distributed file variants with name libgdk-win32-2.0-0.dll. This files most often belongs to product GTK+. and were most often developed by company The GTK developer community. This files most often have description GIMP Drawing Kit. Agregate rating is 1(1) stars - based on 1 reviews.This file is Dynamic-link Library. This library can be loaded and executed in any running process.

libgdk-win32-2.0-0.dll Library

File details of most used file with name "libgdk-win32-2.0-0.dll"

Product:
GTK+
Company:
The GTK developer community
Description:
GIMP Drawing Kit
Version:
2.16.6.0
MD5:
8441cf1ce40144cb2650db74ca5f74d0
SHA1:
4a29e8a34db593d115eb9b72915d6b9b039db374
SHA256:
030dee27b90fa3a53d1dd2b656b9b38159bcaa03d9a6d79710341649ad39eacb
Size:
827670
Directory:
E:\Program Files\Pidgin\Gtk\bin
Operating System:
Windows XP
Occurence:
High oc2

Is the library "libgdk-win32-2.0-0.dll" Safe or Threat ?

Loading Graph
100% of reviewed files are marked as Threat .
Latest new variant of the file with name "libgdk-win32-2.0-0.dll" was discovered 4532 days ago. Our database contains 82 variants of the file "libgdk-win32-2.0-0.dll" with final rating Safe and 1 variants with final rating Threat . Final ratings are based on file reviews, discovered date, users occurence and antivirus scan results.

User Reviews of the "libgdk-win32-2.0-0.dll"

There are multiple files in compliance with actual filter settings. All reviews for this files will be displayed.

Reviews for all files with name "libgdk-win32-2.0-0.dll"

  • THREATrating from user hoome for file %SystemDiskRoot%\Bacup USB\PortableApps\PidginPortable\App\GTK\bin\libgdk-win32-2.0-0.dll (Variant: 19493713)

    Reaction Information Security has discovered a vulnerability in GIMP, which can be exploited by malicious people to compromise a vulnerable system.
    The vulnerability is caused due to an error within the script-fu server process when handling command input. This can be exploited to cause a buffer overflow via a specially crafted packet sent to TCP port 10008.
    Successful exploitation allows execution of arbitrary code, but requires the server to be manually started.
    The vulnerability is reported in versions prior to 2.8.0 (confirmed in version 2.6.11).