Home

More on Boolean Queries

Using Boolean operators (AND, OR, NOT) give you many ways to refine your search.

More complex Boolean queries

These queries show you how to use many robust search capabilities in one query.

vulnerability.status:`ACTIVE` AND (vulnerability.typeDetected:`POTENTIAL_VULNERABILITY` and vulnerability.age:[181..+] and not (vulnerability.severity:`1`))

vulnerability.severity:3 AND (vulnerability.typeDetected:`POTENTIAL_VULNERABILITY` or vulnerability.typeDetected:`CONFIRMED_VULNERABILITY`) and vulnerability.lastDetectedDate:[2022-01-01 .. 2022-11-01]]

Good to Know - Max query depth

We've implemented controls in query parsing for queries containing the operators AND, OR. The maximum depth allowed for an AND/OR query cannot cross 1000 levels. If you run a query having more than 1000 levels of depth, an error is returned.

A simple query like this has level of depth 2

vulnerability.patchable:true and vulnerability.groupName:`Path Disclosure

A more complex query like this has level of depth 5

vulnerability.patchable:true and (vulnerability.groupName:`Path Disclosure` or vulnerability.groupName:`Information Disclosure` or vulnerability.groupName:`Social Security Numbers (US)`) AND NOT vulnerability.lastDetectedDate>"2021-06-20"

 

Step-by-step search tutorial