https://bugs.documentfoundation.org/show_bug.cgi?id=155482
Stéphane Guillou (stragu) <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |stephane.guillou@libreoffic | |e.org Status|UNCONFIRMED |RESOLVED Resolution|--- |NOTOURBUG URL| |https://ask.libreoffice.org | |/t/exploit-payload-process- | |in-libre-office-file/91808 --- Comment #1 from Stéphane Guillou (stragu) <[email protected]> --- Are you the person who asked on Ask.LO ? https://ask.libreoffice.org/t/exploit-payload-process-in-libre-office-file/91808 Have you looked on MalwareBytes' side? It looks likely to be a false-positive on their side. https://ask.libreoffice.org/t/exploit-payload-process-in-libre-office-file/91808/3 You can whitelist applications or files: https://support.malwarebytes.com/hc/en-us/articles/360038479234-Exclude-detections-in-Malwarebytes-for-Windows You can ask Malwarebytes to confirm it is a false positive: https://support.malwarebytes.com/hc/en-us/articles/360038524154-Report-a-false-positive-to-Malwarebytes-Support -- You are receiving this mail because: You are the assignee for the bug.
