+ "You may search using:<br><ul><li><strong>IDs</strong><ul><li>CVE ID <ul><li>Specific <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE ID</a> (e.g., “CVE-2015-8405”)</li><li>Note that this returns records where there is a match for the CVE ID anywhere in the CVE Record (e.g., “CVE-2015-8405” returns the CVE named, as well as any CVEs that have that CVE ID in other fields, such as in the description)</li></ul></li><li>CWE ID <ul><li>Specific <a href='/About/RelatedEfforts#CWE'>Common Weakness Enumeration (CWE™)</a> entries (e.g., “CWE-123”)</li></ul></li><li>CAPEC ID <ul><li>Specific <a href='/About/RelatedEfforts#CAPEC'>Common Attack Pattern Enumerations and Classification (CAPEC™)</a> entries (e.g., “CAPEC-123”)</li></ul></li></ul></li></ul><ul><li><strong>Date and Date Range Search</strong><ul><li>you can perform date searches on date fields, using the following formats <ul><li>YYYY-MM-DD (e.g., 2025-10-28)</li><li>YYYY-MM-DDTHH:MM:SS (e.g., 2025-10-28T12:00:00-4:00 for noon on that date New York time)</li></ul></li><li>you can perform date range searches by separating a beginning date/time and the ending date/time with 2 periods <ul><li>YYYY-MM-DD..YYYY-MM-DD (e.g., 2025-10-27..2025-10-28 for the 48 hour period between those 2 dates)</li><li>YYYY-MM-DDTHH:MM:SS..YYYY-MM-DDTHH:MM:SS (e.g., 2025-10-28T01:30:00..2025-10-28T01:45:00 for the 15 minute period between those 2 timestamps)</li></ul></li><li>If you don't specify a time zone, the \"Z\" time zone is assumed (i.e., Greenwich Mean Time)</li><li>date ranges are inclusive, meaning the search will include both the starting date and the ending date in the results</li></ul></li></ul><ul><li><strong>Exact Phrase Search</strong><ul><li>surround the phrase in double quotes (e.g., \"access denied\")</li><li>you can mix and match phrases and words (e.g., \"access denied\" vuln*)</li></ul></li></ul><ul><li><strong>General</strong><ul><li>Note that if you provide multiple CVE IDs, the search will only return results that contain ALL CVE IDs you specify in each record, which may not be what you expect</li><li>Note that currently you cannot mix text search with date/range search, you can only search on one or the other</li><li>Search terms are case-insensitive and may contain words of alphanumeric and Unicode characters</li><li>The wildcard characters “*” and “?” are now supported, which allows searching for patterns instead of only exact matches. For example, searching for “vuln*” would return any CVE Records that contains the word “vulnerable” or “vulnerability”, as well as any other word that starts with “vuln”. The “?” is similar but matches only a single character, useful for finding slight variations in how a word is spelled. Including the “?” will match any letter, number, or symbol in the position in which it is placed. For example, searching for “reject??” would return any CVE Records that include “reject” followed by any other two characters (i.e., letters, numbers, or symbols) such as “rejected”, “rejector”, “reject61”, etc.</li><li>Supported search scenarios include:<br><ul><li>Wildcards (e.g., “vuln*”, “reject??”)</li><li>Hyphenated words (e.g., “man-in-the-middle”)</li><li>Exact version strings (e.g., “6.17.4”) <li>Exact IPv4 strings (e.g., “127.0.0.1”)</li><li>Date (e.g., YYYY-MM-DD [e.g., 2025-11-12] or YYYY-MM-DDTHH:MM:SS [e.g., 2025-11-28T12:00:00-4:00])</li><li>Date range (e.g., YYYY-MM-DD..YYYY [e.g., 2025-11-12..2025-11-28] or YYYY-MM-DDTHH:MM:SS..YYYY-MM-DDTHH:MM:SS [e.g., 2025-10-28T01:30:00..2025-10-28T01:45:00])</li><li>Exact phrase (e.g., “access denied”)</li><li>Exact filenames (e.g., “main.cpp”)</li><li>URLs (e.g., “http://www.ibm.com/support/docview.wss?uid”)</li></ul></li><li>Symbols currently not supported are:\u00a0\u00a0\u00a0() {} [] ' ` <> | ; ! ~ ^ + %</li></ul></li></ul>"
0 commit comments