+ "You may search using:<br/><ul><li><strong>IDs</strong><ul><li>CVE ID<ul><li>Specific <a href='/ResourcesSupport/Glossary?activeTerm=glossaryCVEID'>CVE ID</a> (e.g., “CVE-2015-8405”)</li><li>Note that this returns records where there is a match for the CVE ID anywhere in the CVE Record (e.g., “CVE-2015-8405” returns the CVE named, as well as any CVEs that have that CVE ID in other fields, such as in the description)</li><li>The nominal CVE ID Year (e.g., “CVE-2025” returns all CVEs reserved in the CVE-2025 year series)</li><li>The year must be a full year (e.g., “CVE-202” is invalid and will produce no results)</li></ul></li><li>CWE ID<ul><li>Specific <a href='/About/RelatedEfforts#CWE'>Common Weakness Enumeration (CWE™)</a> entries (e.g., “CWE-123”)</li></ul></li><li> CAPEC ID<ul><li>Specific <a href='/About/RelatedEfforts#CAPEC'>Common Attack Pattern Enumerations and Classification (CAPEC™)</a> entries (e.g., “CAPEC-123”)</li></ul></li></ul></li><li><strong>General</strong><ul><li>Note that if you provide multiple CVE IDs, the search will only return results that contain ALL CVE IDs you specify in each record, which may not be what you expect</li><li>Search terms are case-insensitive and may contain words of alphanumeric and Unicode characters</li><li>The wildcard characters “*” and “?” are now supported, which allows searching for patterns instead of only exact matches. For example, searching for “vuln*” would return any CVE Records that contains the word “vulnerable” or “vulnerability”, as well as any other word that starts with “vuln”. The “?” is similar but matches only a single character, useful for finding slight variations in how a word is spelled. Including the “?” will match any letter, number, or symbol in the position in which it is placed. For example, searching for “reject??” would return any CVE Records that include “reject” followed by any other two characters (i.e., letters, numbers, or symbols) such as “rejected”, “rejector”, “reject61”, etc.</li><li>Supported search scenarios include:<br/><ul><li>Wildcards (e.g., “vuln*”, “reject??”)</li><li>Hyphenated words (e.g., “man-in-the-middle”)</li><li>Exact version strings (e.g., “6.17.4”)<li>Exact IPv4 strings (e.g., “127.0.0.1”)</li><li>Exact filenames (e.g., “main.cpp”)</li><li>URLs (e.g., “http://www.ibm.com/support/docview.wss?uid”)</li></ul></li><li>Symbols currently not supported are:\u00a0\u00a0\u00a0() {} [] \" ' ` <> | ; ! ~ ^ + %</li></ul></li></ul>"
0 commit comments