https://bugs.documentfoundation.org/show_bug.cgi?id=155482

Stéphane Guillou (stragu) <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |stephane.guillou@libreoffic
                   |                            |e.org
             Status|UNCONFIRMED                 |RESOLVED
         Resolution|---                         |NOTOURBUG
                URL|                            |https://ask.libreoffice.org
                   |                            |/t/exploit-payload-process-
                   |                            |in-libre-office-file/91808

--- Comment #1 from Stéphane Guillou (stragu) 
<[email protected]> ---
Are you the person who asked on Ask.LO ?
https://ask.libreoffice.org/t/exploit-payload-process-in-libre-office-file/91808

Have you looked on MalwareBytes' side? It looks likely to be a false-positive
on their side.
https://ask.libreoffice.org/t/exploit-payload-process-in-libre-office-file/91808/3

You can whitelist applications or files:
https://support.malwarebytes.com/hc/en-us/articles/360038479234-Exclude-detections-in-Malwarebytes-for-Windows

You can ask Malwarebytes to confirm it is a false positive:
https://support.malwarebytes.com/hc/en-us/articles/360038524154-Report-a-false-positive-to-Malwarebytes-Support

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to