Searching Applications

Custom pattern search looks for application names, uploader usernames and CVE entries in the found libraries by default. More specific searches are possible using the following keywords:

Keyword Description Example
distro: distribution Search for applications containing a specific linux distribution. distro:ubuntu
distro_version: distribution version Search together with distro for applications containing a specific linux distribution version. distro_version:18.04.1
lib: libname[:version] Search for applications containing a specific library. Version is not required. Supports excluding search. lib:libpng lib:libpng:1.6.40
user: username Search for applications uploaded by a specific user user:admin
file: filename Search for applications with filename file:.apk
cve: cve Search for applications with a specific CVE. Supports excluding search. cve:2014-1234
meta: KEY Search for applications with custom data key "KEY" set. Supports excluding search. meta:BUSINESS_UNIT
meta: KEY=Value Search for applications with custom data key containing value. Supports excluding search. meta:BUSINESS_UNIT=eCenter
vuln: vuln Search for applications with a specific vulnerability. Supports excluding search. vuln:BDSA-2022-1234

Table: Searching applications with specific searches

You can also chain multiple search keywords separated with whitespace.

Example: Search for all android applications containing libtiff from user Malakias:

 file:.apk lib:libtiff user:malakias

You can use an asterisk anywhere in the file keyword search term for wildcard searches, for example, file:*.bin. All searches are case-insensitive.

CVE entries can be searched also with the following queries: 2014-1234, CVE-2014-1234 and cve:CVE-2014-1234

Some of the keywords support excluding search. Example: Search all applications not containing bzip2:

 -lib:bzip2