https://bugs.documentfoundation.org/show_bug.cgi?id=120675
V Stuart Foote <vstuart.fo...@utsa.edu> changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|Writer |sdk
Resolution|INVALID |---
CC| |caol...@redhat.com
Ever confirmed|0 |1
Status|RESOLVED |NEW
--- Comment #5 from V Stuart Foote <vstuart.fo...@utsa.edu> ---
So looking at the content.xml the script call is: "<script:event-listener
script:language="ooo:script" script:event-name="dom:mouseover"
xlink:href="vnd.sun.star.script:../../../program/python-core-3.5.5/lib/pydoc.py$tempfilepager(1,
calc.exe )?language=Python&location=share" xlink:type="simple"/>"
So what is the issue, that python is calling a system executable? So security?
--
You are receiving this mail because:
You are the assignee for the bug.
_______________________________________________
Libreoffice-bugs mailing list
Libreoffice-bugs@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/libreoffice-bugs