Screenshots
Example Usage
$ ./venv/bin/python3 vulristics.py --report-type "cve_list" --cve-project-name "CVE-2025-24054" --cve-list-path "analyze_cve_list.txt" --cve-data-sources "ms,nvd,epss,vulners,attackerkb,bdu,custom" --rewrite-flag "True" --bdu-use-vulnerability-descriptions-flag "False" --bdu-use-product-names-flag "False"

                       /$$           /$$             /$$     /$$                    
                     | $$          |__/            | $$    |__/                    
 /$$    /$$ /$$   /$$| $$  /$$$$$$  /$$  /$$$$$$$ /$$$$$$   /$$  /$$$$$$$  /$$$$$$$
|  $$  /$$/| $$  | $$| $$ /$$__  $$| $$ /$$_____/|_  $$_/  | $$ /$$_____/ /$$_____/
 \  $$/$$/ | $$  | $$| $$| $$  \__/| $$|  $$$$$$   | $$    | $$| $$      |  $$$$$$ 
  \  $$$/  | $$  | $$| $$| $$      | $$ \____  $$  | $$ /$$| $$| $$       \____  $$
   \  $/   |  $$$$$$/| $$| $$      | $$ /$$$$$$$/  |  $$$$/| $$|  $$$$$$$ /$$$$$$$/
    \_/     \______/ |__/|__/      |__/|_______/    \___/  |__/ \_______/|_______/  

Reading existing profile data/profiles/CVE-2025-24054_profile.json...
Exclude CVEs: 0
No specified products to analyze set in profile, reporting everything
All CVEs: 1
Enabled data sources: ['bdu', 'nvd', 'epss', 'vul