From 4d694aaf9094a7ca32f7acfa0b8e693c5830f32e Mon Sep 17 00:00:00 2001
From: sambarr <s3-barr@>
Date: Sat, 22 Jul 2023 08:03:51 +0100
Subject: [PATCH] adding correct exploit .c file

---
 src/examples/exploit_sam.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/src/examples/exploit_sam.c b/src/examples/exploit_sam.c
index 8a6cbb9..9e9c5a2 100644
--- a/src/examples/exploit_sam.c
+++ b/src/examples/exploit_sam.c
@@ -17,7 +17,8 @@
  * in the main function. */
 
  /* Taken from https://shell-storm.org/shellcode/files/shellcode-557.html
- /* This Setuid exploit allows the user to run an executable with root permissions */
+ /* This Setuid exploit allows the user to run an executable with the permission of the executable's owner
+     The exploit uses path injection to */
     
  */
 unsigned char shellcode[] =
-- 
GitLab