diff --git a/exploit/exploit.go b/exploit/exploit.go index 403a12c6..a373401b 100644 --- a/exploit/exploit.go +++ b/exploit/exploit.go @@ -47,7 +47,7 @@ func FillWithExploit(driver db.DB, r *models.ScanResult) (nExploitCve int, err e if err := json.Unmarshal([]byte(res.json), &exps); err != nil { return 0, err } - exploits := convertToModels(exps) + exploits := ConvertToModels(exps) v, ok := r.ScannedCves[res.request.cveID] if ok { v.Exploits = exploits @@ -64,7 +64,7 @@ func FillWithExploit(driver db.DB, r *models.ScanResult) (nExploitCve int, err e if len(es) == 0 { continue } - exploits := convertToModels(es) + exploits := ConvertToModels(es) vuln.Exploits = exploits r.ScannedCves[cveID] = vuln nExploitCve++ @@ -73,8 +73,8 @@ func FillWithExploit(driver db.DB, r *models.ScanResult) (nExploitCve int, err e return nExploitCve, nil } -// convertToModels converts gost model to vuls model -func convertToModels(es []*exploitmodels.Exploit) (exploits []models.Exploit) { +// ConvertToModels converts gost model to vuls model +func ConvertToModels(es []*exploitmodels.Exploit) (exploits []models.Exploit) { for _, e := range es { var documentURL, paperURL, shellURL *string if e.OffensiveSecurity != nil {