From a04c16b586f2b2a375ca8ba7015095976ce8a040 Mon Sep 17 00:00:00 2001 From: Hilko Bengen Date: Sat, 11 Dec 2021 18:10:48 +0100 Subject: [PATCH] Fix copy-pasta typo --- README.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index c31e7e1..b1dcd7c 100644 --- a/README.md +++ b/README.md @@ -3,10 +3,9 @@ (Written in Go because, you know, "write once, run anywhere.") This is a simple tool that can be used to find vulnerable instances of -log4j 1.x and 2.x (CVE-CVE-2019-17571, CVE-2021-44228) in -installations of Java software such as web applications. JAR and WAR -archives are inspected and class files that are known to be vulnerable -are flagged. +log4j 1.x and 2.x (CVE-2019-17571, CVE-2021-44228) in installations of +Java software such as web applications. JAR and WAR archives are +inspected and class files that are known to be vulnerable are flagged. This tool currently checks for known build artifacts that have been obtained through Maven. From-source rebuilds as they are done for