From 61a81b60e8ff56e2af69271edf0bb662322627bb Mon Sep 17 00:00:00 2001
From: jorgectf
Date: Thu, 9 Sep 2021 19:06:58 +0200
Subject: [PATCH] Extend `.qlref`
---
python/ql/src/experimental/Security/CWE-611/XXE.qlref | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/python/ql/src/experimental/Security/CWE-611/XXE.qlref b/python/ql/src/experimental/Security/CWE-611/XXE.qlref
index 928cdb46923..d8b0c6a7ed1 100644
--- a/python/ql/src/experimental/Security/CWE-611/XXE.qlref
+++ b/python/ql/src/experimental/Security/CWE-611/XXE.qlref
@@ -16,6 +16,11 @@ Refer to the following links to check the details regarding how and which librar
Python 3.
Python 2.
+
+This query currently identifies vulnerable XML parsing from the following parsers:
+xml.etree.ElementTree.XMLParser, lxml.etree.XMLParser, lxml.etree.get_default_parser,
+xml.sax.make_parser.
+