description:It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. (Note that passing the `-p` option to the shell may be useless or even wrong for certain distributions like Debian that run in privileged mode by default.)
description:It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. This works if the default system shell doesn't drop the SUID privileges, which is usually only valid for Debian Linux systems.