Searching Applications
Custom pattern search looks for application names, uploader usernames and CVE entries in the found libraries by default. More specific searches are possible using the following keywords:
Keyword | Description | Example |
---|---|---|
distro: | distribution Search for applications containing a
specific linux distribution. |
distro:ubuntu |
distro_version: | distribution version Search together with distro for
applications containing a specific linux distribution version. |
distro_version:18.04.1 |
lib: | libname[:version] Search for applications containing a
specific library. Version is not required. Supports excluding search. |
lib:libpng lib:libpng:1.6.40 |
user: | username Search for applications uploaded by a
specific user |
user:admin |
file: | filename Search for applications with
filename |
file:.apk |
cve: | cve Search for applications with a specific CVE.
Supports excluding search. |
cve:2014-1234 |
meta: | KEY Search for applications with custom data key "KEY" set. Supports
excluding search. |
meta:BUSINESS_UNIT |
meta: | KEY=Value Search for applications with custom data key containing value. Supports excluding search. | meta:BUSINESS_UNIT=eCenter |
vuln: | vuln Search for applications with a specific
vulnerability. Supports excluding search. |
vuln:BDSA-2022-1234 |
Table: Searching applications with specific searches
You can also chain multiple search keywords separated with whitespace.
Example: Search for all android applications containing libtiff from user Malakias:
file:.apk lib:libtiff user:malakias
You can use an asterisk anywhere in the file keyword search term for wildcard searches,
for example, file:*.bin
. All searches are case-insensitive.
CVE entries can be searched also with the following queries: 2014-1234, CVE-2014-1234 and cve:CVE-2014-1234
Some of the keywords support excluding search. Example: Search all applications not containing bzip2:
-lib:bzip2