EPSS Lookup Tool Changelog

Version 1.5 - April 04, 2025

Updated CISA KEV Reference Link

Enhancements

  • Updated CISA KEV Reference Link

    Modified the CISA KEV reference link to point to the specific CVE record on CVE.org instead of the general CISA KEV catalog page.

    • Changed from a static link (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) to a dynamic link using the CVE number (e.g., https://www.cve.org/CVERecord?id=CVE-2025-22457).
    • Updated both the displayed results and the copied text in the "Copy Results" feature to reflect the new link.

Bug Fixes

None introduced in this update.

Notes

  • The new reference link provides more specific information about the CVE, improving user access to detailed vulnerability records.
  • No impact on performance or other functionality.
Version 1.3.2 - April 04, 2025

Added CISA KEV Due Date, Performance Optimizations, and UI Enhancements

Features

  • Added CISA KEV Due Date to Results

    Added the "Due Date" field to the results for CVEs found in the CISA KEV catalog, showing the remediation deadline (e.g., "2022-01-10"). Displays "N/A" if the due date is not available.

    • Extracts the dueDate from the matching KEV entry in the cached data.
    • Included in the copied results for reporting.
  • Performance Optimization with Caching

    Optimized performance by caching the CISA KEV data on page load and reusing it for subsequent lookups.

    • Added a cisaKevCache object to store the data, last fetch timestamp, and a Set of CVE IDs for O(1) lookups.
    • Cache expires after 24 hours, ensuring data freshness without repeated fetches.
    • Added a loading indicator during the initial fetch to improve user experience.
  • Local CISA KEV File Hosting

    Removed dependency on CORS proxies by hosting the CISA KEV JSON file locally, updated hourly via a cron job.

    • Downloads the file from https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json every hour.
    • Fetch time reduced from ~1-2 seconds (via proxy) to ~50-100ms (local file).
  • Widened Display and Enlarged Radar Chart

    Improved readability by widening the display and enlarging the radar chart.

    • Increased .container max-width from 500px to 800px.
    • Increased radar chart size from 400px to 600px, with responsive scaling.
    • Adjusted font sizes, padding, and margins for better visual balance.

Bug Fixes

  • Fixed CISA KEV Status Display

    Resolved an issue where CISA KEV status was incorrectly showing "Unknown" due to CORS fetch failures.

    • Initially fixed by isolating the CISA KEV fetch and using a CORS proxy.
    • Further resolved by hosting the file locally, eliminating CORS issues.

Notes

  • Added .loading CSS class for the loading indicator during initial CISA KEV fetch.
  • Performance improvements reduce lookup time to ~400-1000ms after the initial fetch.
  • Local file hosting requires a cron job setup (e.g., using curl or Node.js script) to download the CISA KEV file hourly.
Version 1.3.1 - April 04, 2025

Updated Footer Layout and Added CISA KEV Status

Enhancements

  • Repositioned Changelog Link

    Modified the footer layout to place the "Changelog" link on a new line below the "Data provided by" line.

    • Split the footer content into separate

      tags for better visual separation.

    • Removed the separator (|) as it was no longer needed with the new layout.
    • Improves readability and aligns with user expectations for footer navigation.
  • Added CISA KEV Status and Reference

    Added a check for whether a CVE is in the CISA KEV catalog, displaying "Yes" with a reference link or "No".

    • Fetches data from https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json.
    • Initially used a CORS proxy due to cross-origin restrictions, later replaced with local hosting in v1.3.2.
    • Included in the copied results for reporting.

Bug Fixes

None introduced in this update.

Notes

  • Initial CISA KEV implementation faced CORS issues, addressed in v1.3.2.
  • UI adjustment does not affect functionality.
Version 1.3.0 - April 04, 2025

Added Copy Results Feature for Reporting

Features

  • Copy Results to Clipboard

    Added a "Copy Results" button to the output section, allowing users to copy vulnerability details in a report-friendly text format.

    • Formats results as plain text, including CVE, EPSS, Percentile, CVSS Score, Last Updated, Published Date, Description, and References.
    • Uses the navigator.clipboard API for modern browsers, with a fallback for older browsers using a temporary textarea.
    • Provides visual feedback by changing the button text to "Copied!" for 2 seconds after a successful copy.
    • Excludes the radar chart from the copied text, as it is a visual element.

    Users can now easily paste results into reports, emails, or other documents, improving workflow efficiency.

Bug Fixes

None introduced in this update.

Notes

  • Added .copy-button CSS class to style the new button consistently with the existing design.
  • Includes error handling with an alert if copying fails.
Version 1.2.0 - April 04, 2025

Added URL Query Parameter Support and Enhanced Result Details

Features

  • URL Query Parameter Support

    Added functionality to accept a CVE ID from the URL query string (e.g., epsslook.com/?cve=CVE-2055-123456) to auto-populate the input field and trigger a lookup.

    • Introduced getQueryParam(param) function to parse URL query parameters.
    • Added DOMContentLoaded event listener to extract, validate, and submit the CVE.
    • Users can now share or bookmark direct links to specific CVE lookups.
  • Enhanced Result Details

    Expanded search result output to include additional vulnerability details from the NVD API:

    • Published Date: Shows when the CVE was published (e.g., "2022-03-15T17:15:00").
    • Description: Provides a summary of the vulnerability.
    • References: Lists up to 3 external links (e.g., advisories, NVD details) as clickable URLs.

    These fields are conditionally rendered when NVD data is available, enhancing context for users.

Bug Fixes

None introduced in this update.

Notes

  • References are capped at 3 to keep the UI manageable.
  • New fields use existing styles for consistency.
  • No additional API calls; leverages existing NVD response.
Version 1.1.0 - [Previous Version, Hypothetical]

Added URL Query Parameter Support

Features

  • URL Query Parameter Support

    Initial implementation of URL query parameter parsing and auto-submission (as detailed in v1.2.0).

    Released prior to adding enhanced result details.

Version 1.0.0 - [Initial Release, Hypothetical]

Initial Release

Features

  • Basic EPSS Lookup Tool

    Initial release with:

    • Input form for CVE entry.
    • EPSS score, percentile, CVSS score, severity, last updated date, and radar chart output.
    • Theme toggle (light/dark mode).
    • No URL parameter support or additional NVD details.