From 61a81b60e8ff56e2af69271edf0bb662322627bb Mon Sep 17 00:00:00 2001 From: jorgectf Date: Thu, 9 Sep 2021 19:06:58 +0200 Subject: [PATCH] Extend `.qlref` --- python/ql/src/experimental/Security/CWE-611/XXE.qlref | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/python/ql/src/experimental/Security/CWE-611/XXE.qlref b/python/ql/src/experimental/Security/CWE-611/XXE.qlref index 928cdb46923..d8b0c6a7ed1 100644 --- a/python/ql/src/experimental/Security/CWE-611/XXE.qlref +++ b/python/ql/src/experimental/Security/CWE-611/XXE.qlref @@ -16,6 +16,11 @@ Refer to the following links to check the details regarding how and which librar
  • Python 3.
  • Python 2.
  • +

    +This query currently identifies vulnerable XML parsing from the following parsers: +xml.etree.ElementTree.XMLParser, lxml.etree.XMLParser, lxml.etree.get_default_parser, +xml.sax.make_parser. +