README.md in shodanz-1.0.5 vs README.md in shodanz-1.0.6
- old
+ new
@@ -269,10 +269,10 @@
This method behaves identical to the Exploits API `search` method with the difference that it doesn't return any results.
```ruby
client.exploits_api.count("python") # Count Snek vulns.
client.exploits_api.count(port: 22) # Port number for the affected service if the exploit is remote.
-client.exploits_api.search(type: "shellcode") # A category of exploit to search for.
+client.exploits_api.count(type: "shellcode") # A category of exploit to search for.
client.exploits_api.count(osvdb: "100007") # Open Source Vulnerability Database ID for the exploit.
```
## License