diff --git a/src/examples/exploit_sam.c b/src/examples/exploit_sam.c index 8a6cbb93599ab3f61649d552f406b5fbfd44e468..9e9c5a2f7ee63874ebacf75e0853187acc4e504b 100644 --- a/src/examples/exploit_sam.c +++ b/src/examples/exploit_sam.c @@ -17,7 +17,8 @@ * in the main function. */ /* Taken from https://shell-storm.org/shellcode/files/shellcode-557.html - /* This Setuid exploit allows the user to run an executable with root permissions */ + /* This Setuid exploit allows the user to run an executable with the permission of the executable's owner + The exploit uses path injection to */ */ unsigned char shellcode[] =