Using Boolean operators (AND, OR, NOT) give you many ways to refine your search.
These queries show you how to use many robust search capabilities in one query.
vulnerability.status:`ACTIVE` AND (vulnerability.typeDetected:`POTENTIAL_VULNERABILITY` and vulnerability.age:[181..+] and not (vulnerability.severity:`1`))
vulnerability.severity:3 AND (vulnerability.typeDetected:`POTENTIAL_VULNERABILITY` or vulnerability.typeDetected:`CONFIRMED_VULNERABILITY`) and vulnerability.lastDetectedDate:[2022-01-01 .. 2022-11-01]]
We've implemented controls in query parsing for queries containing the operators AND, OR. The maximum depth allowed for an AND/OR query cannot cross 1000 levels. If you run a query having more than 1000 levels of depth, an error is returned.
A simple query like this has level of depth 2
vulnerability.patchable:true and vulnerability.groupName:`Path Disclosure
A more complex query like this has level of depth 5
vulnerability.patchable:true and (vulnerability.groupName:`Path Disclosure` or vulnerability.groupName:`Information Disclosure` or vulnerability.groupName:`Social Security Numbers (US)`) AND NOT vulnerability.lastDetectedDate>"2021-06-20"