Filter: CveFilter

Filter type for Cve.

All fields in this type are and-combined; see the or field for or-combination.


Input Fields

NameTypeDescription
ANDCveFilter

A field that checks if all filters in the list apply

If the list is empty, this filter applies to all objects.

ORCveFilter

A field that checks if any of the filters in the list apply.

If the list is empty, this filter applies to no objects.

Note that only the items in the list or-combined; this complete OR field is and-combined with outer fields in the parent filter type.

cpes_emptyBoolean

Checks if cpes is an empty list (true) or a non-empty list or null (false).

cpes_everyStringFilter

Makes sure all items in cpes match a certain filter.

cpes_noneStringFilter

Makes sure none of the items in cpes match a certain filter.

Note that you can specify the empty object for this filter to make sure cpes has no items.

cpes_someStringFilter

Makes sure at least one of the items in "cpes" matches a certain filter.

Note that you can specify the empty object for this filter to make sure cpes has at least one item.

createdAtDateTime

Checks if createdAt equals a specified value.

If an index exists on createdAt, it can be used.

The instant this object has been created

createdAt_gtDateTime

Checks if createdAt is greater than a specified value.

The instant this object has been created

createdAt_gteDateTime

Checks if createdAt is greater or equal a specified value.

The instant this object has been created

createdAt_inDateTime

Checks if createdAt is equal to one of the specified values.

The instant this object has been created

createdAt_ltDateTime

Checks if createdAt is less than a specified value.

The instant this object has been created

createdAt_lteDateTime

Checks if createdAt is less or equal a specified value.

The instant this object has been created

createdAt_notDateTime

Checks if createdAt does not equal a specified value

The instant this object has been created

createdAt_not_inDateTime

Checks if createdAt is not equal to one of the specified values.

The instant this object has been created

cveIdString

Checks if cveId equals a specified string, case-sensitively.

If an index exists on cveId, it can be used.

See also like for a case-insensitive filter.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_containsString

Checks if cveId contains a specified string, case-sensitively.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_ends_withString

Checks if cveId ends with a specified string, case-sensitively.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_gtString

Checks if cveId is greater than a specified value.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_gteString

Checks if cveId is greater or equal a specified value.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_inString

Checks if cveId is equal to one of the specified values.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_likeString

Matches cveId against a pattern case-insensitively with the following placeholders:

% matches any sequence of characters, including the empty string; _ matches exactly one character; \ can be used to escape the placeholders (use \\ for a literal backslash);

If an index exists on cveId, it can be used for the literal prefix (the part until the first placeholder).

The CVE ID (e.g. CVE-2019-XXXX)

cveId_ltString

Checks if cveId is less than a specified value.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_lteString

Checks if cveId is less or equal a specified value.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_notString

Checks if cveId does not equal a specified string, case-sensitively.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_not_containsString

Checks if cveId does not contain a specified string, case-sensitively.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_not_ends_withString

Checks if cveId does not end with a specified string, case-sensitively.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_not_inString

Checks if cveId is not equal to one of the specified values.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_not_likeString

Checks if cveId does not match a pattern case-insensitively with the following placeholders:

% matches any sequence of characters, including the empty string; _ matches exactly one character; \ can be used to escape the placeholders (use \\ for a literal backslash);

The CVE ID (e.g. CVE-2019-XXXX)

cveId_not_starts_withString

Checks if cveId does not start with a specified string, case-sensitively.

Never uses an index. Consider using not_like (with the % placeholder) for a case-insensitive filter that can use an index.

The CVE ID (e.g. CVE-2019-XXXX)

cveId_starts_withString

Checks if cveId starts with a specified string, case-sensitively.

Never uses an index. Consider using like (with the % placeholder) for a case-insensitive filter that can use an index.

The CVE ID (e.g. CVE-2019-XXXX)

cvssBaseMetricV2CVSSBaseMetricV2Filter

Checks if cvssBaseMetricV2 is not null, and allows to filter based on its fields.

cvssBaseMetricV3CVSSBaseMetricV3Filter

Checks if cvssBaseMetricV3 is not null, and allows to filter based on its fields.

cvssScoreFloat

Checks if cvssScore equals a specified value.

If an index exists on cvssScore, it can be used.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_gtFloat

Checks if cvssScore is greater than a specified value.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_gteFloat

Checks if cvssScore is greater or equal a specified value.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_inFloat

Checks if cvssScore is equal to one of the specified values.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_ltFloat

Checks if cvssScore is less than a specified value.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_lteFloat

Checks if cvssScore is less or equal a specified value.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_notFloat

Checks if cvssScore does not equal a specified value

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

cvssScore_not_inFloat

Checks if cvssScore is not equal to one of the specified values.

The CVSS score for this CVE. This defaults to the base score for CVSSv3 if available, otherwise it defaults to the base score for CVSSv2.

epssEPSSFilter

Allows to filter on the fields of epss.

Note that epss is an entity extension and thus can never be null, so specifying null to this filter field has no effect.

exploitabilityScoreFloat

Checks if exploitabilityScore equals a specified value.

If an index exists on exploitabilityScore, it can be used.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_gtFloat

Checks if exploitabilityScore is greater than a specified value.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_gteFloat

Checks if exploitabilityScore is greater or equal a specified value.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_inFloat

Checks if exploitabilityScore is equal to one of the specified values.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_ltFloat

Checks if exploitabilityScore is less than a specified value.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_lteFloat

Checks if exploitabilityScore is less or equal a specified value.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_notFloat

Checks if exploitabilityScore does not equal a specified value

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitabilityScore_not_inFloat

Checks if exploitabilityScore is not equal to one of the specified values.

The exploitability score for this CVE. Based on CVSS score and likelihood of exploitability. This score is calculated by using the following formula: exploitability_score = cvss_score * epss_score. Note: The range of the exploitabililty_score is from 0 < exploitabililty_score < cvss_score

exploitsInfoExploitInfoFilter

Allows to filter on the fields of exploitsInfo.

Note that exploitsInfo is an entity extension and thus can never be null, so specifying null to this filter field has no effect.

externalLinkString

Checks if externalLink equals a specified string, case-sensitively.

If an index exists on externalLink, it can be used.

See also like for a case-insensitive filter.

A URL to the full description of the vulnerability

externalLink_containsString

Checks if externalLink contains a specified string, case-sensitively.

A URL to the full description of the vulnerability

externalLink_ends_withString

Checks if externalLink ends with a specified string, case-sensitively.

A URL to the full description of the vulnerability

externalLink_gtString

Checks if externalLink is greater than a specified value.

A URL to the full description of the vulnerability

externalLink_gteString

Checks if externalLink is greater or equal a specified value.

A URL to the full description of the vulnerability

externalLink_inString

Checks if externalLink is equal to one of the specified values.

A URL to the full description of the vulnerability

externalLink_likeString

Matches externalLink against a pattern case-insensitively with the following placeholders:

% matches any sequence of characters, including the empty string; _ matches exactly one character; \ can be used to escape the placeholders (use \\ for a literal backslash);

If an index exists on externalLink, it can be used for the literal prefix (the part until the first placeholder).

A URL to the full description of the vulnerability

externalLink_ltString

Checks if externalLink is less than a specified value.

A URL to the full description of the vulnerability

externalLink_lteString

Checks if externalLink is less or equal a specified value.

A URL to the full description of the vulnerability

externalLink_notString

Checks if externalLink does not equal a specified string, case-sensitively.

A URL to the full description of the vulnerability

externalLink_not_containsString

Checks if externalLink does not contain a specified string, case-sensitively.

A URL to the full description of the vulnerability

externalLink_not_ends_withString

Checks if externalLink does not end with a specified string, case-sensitively.

A URL to the full description of the vulnerability

externalLink_not_inString

Checks if externalLink is not equal to one of the specified values.

A URL to the full description of the vulnerability

externalLink_not_likeString

Checks if externalLink does not match a pattern case-insensitively with the following placeholders:

% matches any sequence of characters, including the empty string; _ matches exactly one character; \ can be used to escape the placeholders (use \\ for a literal backslash);

A URL to the full description of the vulnerability

externalLink_not_starts_withString

Checks if externalLink does not start with a specified string, case-sensitively.

Never uses an index. Consider using not_like (with the % placeholder) for a case-insensitive filter that can use an index.

A URL to the full description of the vulnerability

externalLink_starts_withString

Checks if externalLink starts with a specified string, case-sensitively.

Never uses an index. Consider using like (with the % placeholder) for a case-insensitive filter that can use an index.

A URL to the full description of the vulnerability

findings_emptyBoolean

Checks if findings is an empty list (true) or a non-empty list or null (false).

findings_everyFindingFilter

Makes sure all items in findings match a certain filter.

findings_noneFindingFilter

Makes sure none of the items in findings match a certain filter.

Note that you can specify the empty object for this filter to make sure findings has no items.

findings_someFindingFilter

Makes sure at least one of the items in "findings" matches a certain filter.

Note that you can specify the empty object for this filter to make sure findings has at least one item.

idID

Checks if id equals a specified value.

If an index exists on id, it can be used.

An auto-generated string that identifies this root entity uniquely among others of the same type

id_gtID

Checks if id is greater than a specified value.

An auto-generated string that identifies this root entity uniquely among others of the same type

id_gteID

Checks if id is greater or equal a specified value.

An auto-generated string that identifies this root entity uniquely among others of the same type

id_inID

Checks if id is equal to one of the specified values.

An auto-generated string that identifies this root entity uniquely among others of the same type

id_ltID

Checks if id is less than a specified value.

An auto-generated string that identifies this root entity uniquely among others of the same type

id_lteID

Checks if id is less or equal a specified value.

An auto-generated string that identifies this root entity uniquely among others of the same type

id_notID

Checks if id does not equal a specified value

An auto-generated string that identifies this root entity uniquely among others of the same type

id_not_inID

Checks if id is not equal to one of the specified values.

An auto-generated string that identifies this root entity uniquely among others of the same type

lastUpdatedDateTime

Checks if lastUpdated equals a specified value.

If an index exists on lastUpdated, it can be used.

The date the CVE was last updated, if it has been

lastUpdated_gtDateTime

Checks if lastUpdated is greater than a specified value.

The date the CVE was last updated, if it has been

lastUpdated_gteDateTime

Checks if lastUpdated is greater or equal a specified value.

The date the CVE was last updated, if it has been

lastUpdated_inDateTime

Checks if lastUpdated is equal to one of the specified values.

The date the CVE was last updated, if it has been

lastUpdated_ltDateTime

Checks if lastUpdated is less than a specified value.

The date the CVE was last updated, if it has been

lastUpdated_lteDateTime

Checks if lastUpdated is less or equal a specified value.

The date the CVE was last updated, if it has been

lastUpdated_notDateTime

Checks if lastUpdated does not equal a specified value

The date the CVE was last updated, if it has been

lastUpdated_not_inDateTime

Checks if lastUpdated is not equal to one of the specified values.

The date the CVE was last updated, if it has been

publishedDateTime

Checks if published equals a specified value.

If an index exists on published, it can be used.

The date the CVE was first published

published_gtDateTime

Checks if published is greater than a specified value.

The date the CVE was first published

published_gteDateTime

Checks if published is greater or equal a specified value.

The date the CVE was first published

published_inDateTime

Checks if published is equal to one of the specified values.

The date the CVE was first published

published_ltDateTime

Checks if published is less than a specified value.

The date the CVE was first published

published_lteDateTime

Checks if published is less or equal a specified value.

The date the CVE was first published

published_notDateTime

Checks if published does not equal a specified value

The date the CVE was first published

published_not_inDateTime

Checks if published is not equal to one of the specified values.

The date the CVE was first published

summaryString

Checks if summary equals a specified string, case-sensitively.

If an index exists on summary, it can be used.

See also like for a case-insensitive filter.

A summary description of the vulnerability

summary_containsString

Checks if summary contains a specified string, case-sensitively.

A summary description of the vulnerability

summary_ends_withString

Checks if summary ends with a specified string, case-sensitively.

A summary description of the vulnerability

summary_gtString

Checks if summary is greater than a specified value.

A summary description of the vulnerability

summary_gteString

Checks if summary is greater or equal a specified value.

A summary description of the vulnerability

summary_inString

Checks if summary is equal to one of the specified values.

A summary description of the vulnerability

summary_likeString

Matches summary against a pattern case-insensitively with the following placeholders:

% matches any sequence of characters, including the empty string; _ matches exactly one character; \ can be used to escape the placeholders (use \\ for a literal backslash);

If an index exists on summary, it can be used for the literal prefix (the part until the first placeholder).

A summary description of the vulnerability

summary_ltString

Checks if summary is less than a specified value.

A summary description of the vulnerability

summary_lteString

Checks if summary is less or equal a specified value.

A summary description of the vulnerability

summary_notString

Checks if summary does not equal a specified string, case-sensitively.

A summary description of the vulnerability

summary_not_containsString

Checks if summary does not contain a specified string, case-sensitively.

A summary description of the vulnerability

summary_not_ends_withString

Checks if summary does not end with a specified string, case-sensitively.

A summary description of the vulnerability

summary_not_inString

Checks if summary is not equal to one of the specified values.

A summary description of the vulnerability

summary_not_likeString

Checks if summary does not match a pattern case-insensitively with the following placeholders:

% matches any sequence of characters, including the empty string; _ matches exactly one character; \ can be used to escape the placeholders (use \\ for a literal backslash);

A summary description of the vulnerability

summary_not_starts_withString

Checks if summary does not start with a specified string, case-sensitively.

Never uses an index. Consider using not_like (with the % placeholder) for a case-insensitive filter that can use an index.

A summary description of the vulnerability

summary_starts_withString

Checks if summary starts with a specified string, case-sensitively.

Never uses an index. Consider using like (with the % placeholder) for a case-insensitive filter that can use an index.

A summary description of the vulnerability

updatedAtDateTime

Checks if updatedAt equals a specified value.

If an index exists on updatedAt, it can be used.

The instant this object has been updated the last time (not including relation updates)

updatedAt_gtDateTime

Checks if updatedAt is greater than a specified value.

The instant this object has been updated the last time (not including relation updates)

updatedAt_gteDateTime

Checks if updatedAt is greater or equal a specified value.

The instant this object has been updated the last time (not including relation updates)

updatedAt_inDateTime

Checks if updatedAt is equal to one of the specified values.

The instant this object has been updated the last time (not including relation updates)

updatedAt_ltDateTime

Checks if updatedAt is less than a specified value.

The instant this object has been updated the last time (not including relation updates)

updatedAt_lteDateTime

Checks if updatedAt is less or equal a specified value.

The instant this object has been updated the last time (not including relation updates)

updatedAt_notDateTime

Checks if updatedAt does not equal a specified value

The instant this object has been updated the last time (not including relation updates)

updatedAt_not_inDateTime

Checks if updatedAt is not equal to one of the specified values.

The instant this object has been updated the last time (not including relation updates)


This page was generated: 2024-05-17