CVEQL New Beta Feature
CVEQL is CVEFeed's query language for searching vulnerabilities with precision. Write structured queries to filter CVEs by severity, CVSS score, affected products, CISA KEV status, EPSS scores, and more. Use dot notation to traverse related data and combine conditions with logical operators.
You're using CVEQL as a guest — limited to 5 queries/min with a 5-second DB query execution hard cap.
Create a free account to unlock 10 queries/min, longer execution times, and additional features.
Query
Loading...
Results
Score
Vulnerability
Published
Examples
cvss_score >= 9.0
Critical vulnerabilities (CVSS 9+)
severity = "CRITICAL" and is_cisa_kev = True
CISA KEV critical CVEs
products.vendor.name = "apache"
Apache vulnerabilities
published >= "2025-01-01" and cvss_score >= 7.0
Recent high-severity CVEs
description ~ "buffer overflow"
Description contains text
cisa_kevs.known_ransomware_campaign_use = "known"
Known ransomware campaigns
Operators
= != | Equals / Not equals |
> >= < <= | Comparison |
~ !~ | Contains / Not contains |
in | In list |
and or not | Logical |
Fields
id | CVE ID |
severity | CRITICAL, HIGH, MEDIUM, LOW |
cvss_score | Numeric (0–10) |
published | Date |
last_modified | Date |
description | Text (use ~) |
status | Analyzed, Modified… |
is_remote | Boolean |
is_cisa_kev | Boolean (virtual) |
has_epss | Boolean (virtual) |
has_category | Vuln type |
Related Fields (dot notation)
products.name | Full-text search |
products.vendor.name | Vendor name |
cwes.name | Weakness name |
cisa_kevs.date_added | KEV date |
cisa_kevs.due_date | Remediation due |
epss_scores.score | Probability (0–1) |
epss_scores.percentile | Percentile (0–1) |
Autocomplete is active — start typing to see field suggestions.
Results are limited to the last 90 days by default. Use
published or last_modified in your query to override.
Guest limits: 5 queries/min, 5 sec timeout. Sign up for more.