From 3b814c56a893cf0ef0d51020344da3a1aa2ee0c3 Mon Sep 17 00:00:00 2001 From: Esben Sparre Andreasen Date: Tue, 12 Nov 2024 13:35:23 +0100 Subject: [PATCH] TEST qhelp preview --- python/ql/src/Security/CWE-611/Xxe.qhelp | 1 + 1 file changed, 1 insertion(+) diff --git a/python/ql/src/Security/CWE-611/Xxe.qhelp b/python/ql/src/Security/CWE-611/Xxe.qhelp index 2260966f48020..9a011f7e87b84 100644 --- a/python/ql/src/Security/CWE-611/Xxe.qhelp +++ b/python/ql/src/Security/CWE-611/Xxe.qhelp @@ -2,6 +2,7 @@ +

TEST

Parsing untrusted XML files with a weakly configured XML parser may lead to an XML External Entity (XXE) attack. This type of attack uses external entity references