From 40492ee00a70d9bc83de0747891662372cfcd56e Mon Sep 17 00:00:00 2001 From: Neal McBurnett Date: Sun, 9 Jun 2019 18:55:17 -0600 Subject: [PATCH] fix typos, extraneous text (#831) --- README.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/README.md b/README.md index b533e36a..c0284736 100644 --- a/README.md +++ b/README.md @@ -129,9 +129,8 @@ Vuls uses multiple vulnerability databases [Server mode](https://vuls.io/docs/en/usage-server.html) - First, start Vuls in server mode and listen as an HTTP server. -- Start Vuls in server mode and listen as an HTTP server. - Next, issue a command on the scan target server to collect software information. Then send the result to Vuls Server via HTTP. You receive the scan results as JSON format. -- No SSH needed, No Scanner needed. Only issuing Linux commands directory on the scan tareget server. +- No SSH needed, No Scanner needed. Only issuing Linux commands directory on the scan target server. ### **Dynamic** Analysis