Skip to content

Commit 0efb384

Browse files
Update SecurityExploits/Chrome/SandboxEscape/CVE-2021-30528/README.md
Co-authored-by: intrigus-lgtm <60750685+intrigus-lgtm@users.noreply.github.com>
1 parent 47a75a4 commit 0efb384

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

  • SecurityExploits/Chrome/SandboxEscape/CVE-2021-30528

SecurityExploits/Chrome/SandboxEscape/CVE-2021-30528/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,4 @@ python -m SimpleHTTPServer
2424

2525
Then open the page `http://localhost:8000/trigger2_64.html` or `http://localhost:8000/trigger2_32.html` (depending on the version) from Chrome on the device. The easiest way is to use the `chrome://inspect/#devices` tool to set up the proxies etc. and open the url.
2626

27-
If successful, the shell command will run and a file called `pwn` will be created in the directory `/data/data/org.chromium.chrome/` in the phone. This should success most of the time.
27+
If successful, the shell command will run and a file called `pwn` will be created in the directory `/data/data/org.chromium.chrome/` in the phone. This should succeed most of the time.

0 commit comments

Comments
 (0)