Screenshots
Example Usage
$ ./venv/bin/python3 vulristics.py --report-type "cve_list" --cve-project-name "CVE-2025-24054" --cve-list-path "analyze_cve_list.txt" --cve-data-sources "ms,nvd,epss,vulners,attackerkb,bdu,custom" --rewrite-flag "True" --bdu-use-vulnerability-descriptions-flag "False" --bdu-use-product-names-flag "False"
/$$ /$$ /$$ /$$
| $$ |__/ | $$ |__/
/$$ /$$ /$$ /$$| $$ /$$$$$$ /$$ /$$$$$$$ /$$$$$$ /$$ /$$$$$$$ /$$$$$$$
| $$ /$$/| $$ | $$| $$ /$$__ $$| $$ /$$_____/|_ $$_/ | $$ /$$_____/ /$$_____/
\ $$/$$/ | $$ | $$| $$| $$ \__/| $$| $$$$$$ | $$ | $$| $$ | $$$$$$
\ $$$/ | $$ | $$| $$| $$ | $$ \____ $$ | $$ /$$| $$| $$ \____ $$
\ $/ | $$$$$$/| $$| $$ | $$ /$$$$$$$/ | $$$$/| $$| $$$$$$$ /$$$$$$$/
\_/ \______/ |__/|__/ |__/|_______/ \___/ |__/ \_______/|_______/
Reading existing profile data/profiles/CVE-2025-24054_profile.json...
Exclude CVEs: 0
No specified products to analyze set in profile, reporting everything
All CVEs: 1
Enabled data sources: ['bdu', 'nvd', 'epss', 'vul