From 5c487edc055a315a3792459d57b1dc952a015c9c Mon Sep 17 00:00:00 2001 From: Swissky <12152583+swisskyrepo@users.noreply.github.com> Date: Mon, 2 Mar 2026 17:52:24 +0100 Subject: [PATCH] Change title to 'Elixir Deserialization' and update content Updated the title and provided a brief overview of Server-Side Template Injection in Elixir. --- Server Side Template Injection/Elixir.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Server Side Template Injection/Elixir.md b/Server Side Template Injection/Elixir.md index cfe8cda1..4fc469f9 100644 --- a/Server Side Template Injection/Elixir.md +++ b/Server Side Template Injection/Elixir.md @@ -1,4 +1,4 @@ -# Server Side Template Injection - Elixir +# Elixir Deserialization > Server-Side Template Injection (SSTI) is a vulnerability that arises when an attacker can inject malicious code into a server-side template, causing the server to execute arbitrary commands. In Elixir, SSTI can occur when using templating engines like EEx (Embedded Elixir), especially when user input is incorporated into templates without proper sanitization or validation.