Modified the CISA KEV reference link to point to the specific CVE record on CVE.org instead of the general CISA KEV catalog page.
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
) to a dynamic link using the CVE number (e.g., https://www.cve.org/CVERecord?id=CVE-2025-22457
).None introduced in this update.
Added the "Due Date" field to the results for CVEs found in the CISA KEV catalog, showing the remediation deadline (e.g., "2022-01-10"). Displays "N/A" if the due date is not available.
dueDate
from the matching KEV entry in the cached data.Optimized performance by caching the CISA KEV data on page load and reusing it for subsequent lookups.
cisaKevCache
object to store the data, last fetch timestamp, and a Set
of CVE IDs for O(1) lookups.Removed dependency on CORS proxies by hosting the CISA KEV JSON file locally, updated hourly via a cron job.
https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
every hour.Improved readability by widening the display and enlarging the radar chart.
.container
max-width
from 500px to 800px.Resolved an issue where CISA KEV status was incorrectly showing "Unknown" due to CORS fetch failures.
.loading
CSS class for the loading indicator during initial CISA KEV fetch.curl
or Node.js script) to download the CISA KEV file hourly.Modified the footer layout to place the "Changelog" link on a new line below the "Data provided by" line.
tags for better visual separation.|
) as it was no longer needed with the new layout.Added a check for whether a CVE is in the CISA KEV catalog, displaying "Yes" with a reference link or "No".
https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
.None introduced in this update.
Added a "Copy Results" button to the output section, allowing users to copy vulnerability details in a report-friendly text format.
navigator.clipboard
API for modern browsers, with a fallback for older browsers using a temporary textarea
.Users can now easily paste results into reports, emails, or other documents, improving workflow efficiency.
None introduced in this update.
.copy-button
CSS class to style the new button consistently with the existing design.Added functionality to accept a CVE ID from the URL query string (e.g., epsslook.com/?cve=CVE-2055-123456
) to auto-populate the input field and trigger a lookup.
getQueryParam(param)
function to parse URL query parameters.DOMContentLoaded
event listener to extract, validate, and submit the CVE.Expanded search result output to include additional vulnerability details from the NVD API:
These fields are conditionally rendered when NVD data is available, enhancing context for users.
None introduced in this update.
Initial implementation of URL query parameter parsing and auto-submission (as detailed in v1.2.0).
Released prior to adding enhanced result details.
Initial release with: