• Home
  • Solutions
  • Application Security
  • Security data on Grail
  • Security events
  • Semantic dictionary

Dynatrace semantic dictionary

Latest Dynatrace

Early Adopter

The Dynatrace semantic dictionary defines conventions for storing data in a normalized manner, regardless of the origin of the data. See below for a list of conventions defined for security events, which are a special type of data coming from either internal or external data sources. For more information, see Data structure.

Entity state events

Entity state events are the historical vulnerability states reported per entity level.

The current vulnerability state per entity is exported to Grail regularly.

sql
fetch events | filter event.kind == "SECURITY_EVENT" | filter event.category == "VULNERABILITY_MANAGEMENT" | filter event.type == "VULNERABILITY_STATE_REPORT_EVENT" | filter event.level == "ENTITY"

Entity state: Event data

This section contains general event information.

AttributeTypeDescriptionExamplesRequirement Level
event.categorystringCategorization based on the product and data generating this event.VULNERABILITY_MANAGEMENTRecommended
event.descriptionstringThe human-readable description text of an event.S-49 Remote Code Execution state event reportedRecommended
event.group_labelstringGroup label of an event.STATE_REPORTRecommended
event.kindstringGives high-level information about the kind of information the event contains, without being specific about the contents of the event. Helps to determine the record type of a raw event.
Tags: permission
SECURITY_EVENTRecommended
event.levelstringMain reference point to which the event or data is related. Possible values are Vulnerability (shows the global aggregation across the entire environment and comprises all entities and management zones) and Entity (shows the assessment based on the entity itself).ENTITYRecommended
event.namestringThe human-readable display name of an event type.Vulnerability historical state report eventRecommended
event.providerstringSource of the event (for example, the name of the component or system that generated the event).
Tags: permission
OneAgent; K8S; Davis; VMWare; GCP; AWS; LIMA_USAGE_STREAMRecommended
event.provider_productstringName of the product providing this event.Runtime Vulnerability Analytics; Snyk ContainerRecommended
event.statusstringStatus of an event as being either Active or Closed.OPEN; RESOLVED; MUTEDRecommended
event.typestringThe unique type identifier of a given event.
Tags: permission
VULNERABILITY_STATE_REPORT_EVENTRecommended
timestamptimestampThe time (UNIX Epoch time in nanoseconds) when the event originated, typically when it was created by the source. If no original timestamp is available, it is populated at ingest time. Required for all events. In case of a correlated event (for example, ITIL events), this time could be different from the event.start time, as this time represents the actual timestamp when the "update" for the event was created.1649822520123123123Recommended

Entity state: Vulnerability data

This section contains information about the vulnerability and its global parent, with a focus on the affected entities.

AttributeTypeDescriptionExamplesRequirement Level
vulnerability.cvss.base_scoredoubleVulnerability's CVSS base score provided by NVD.8.1Recommended
vulnerability.cvss.versionstringVulnerability's CVSS score version.3.1Recommended
vulnerability.davis_assessment.assessment_modestringAvailability of the information based on which the vulnerability assessment has been done.FULL; NOT_AVAILABLE; REDUCEDRecommended
vulnerability.davis_assessment.data_assets_statusstringVulnerability's reachability of related data assets by affected entities.NOT_AVAILABLE; NOT_DETECTED; REACHABLERecommended
vulnerability.davis_assessment.exploit_statusstringVulnerability's public exploits status.AVAILABLE; NOT_AVAILABLERecommended
vulnerability.davis_assessment.exposure_statusstringVulnerability's internet exposure status.NOT_AVAILABLE; NOT_DETECTED; PUBLIC_NETWORKRecommended
vulnerability.davis_assessment.levelstringVulnerability's risk level based on Davis Security Score.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.davis_assessment.scoredoubleVulnerability's Davis Security Score (1-10) calculated by Dynatrace.8.1Recommended
vulnerability.davis_assessment.vulnerable_function_statusstringUsage status of the vulnerable functions causing the vulnerability.IN_USE; NOT_AVAILABLE; NOT_IN_USERecommended
vulnerability.descriptionstringDescription of the vulnerability.More detailed description about improper input validation vulnerability.Recommended
vulnerability.display_idstringDynatrace user-readable identifier for the vulnerability.S-1234Recommended
vulnerability.external_idstringExternal provider's unique identifier for the vulnerability.SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30646Recommended
vulnerability.external_urlstringExternal provider's URL to the details page of the vulnerability.https://example.comRecommended
vulnerability.first_seentimestampTimestamp of when the vulnerability was first detected.2023-03-22T13:19:36.945ZRecommended
vulnerability.idstringDynatrace unique identifier for the vulnerability.2039861408676243188Recommended
vulnerability.mute.change_datetimestampTimestamp of the vulnerability's last muted or unmuted action.2023-03-22T13:19:36.945ZRecommended
vulnerability.mute.reasonstringReason for muting or unmuting the vulnerability.Muted: False positiveRecommended
vulnerability.mute.statusstringVulnerability's mute status.MUTED; NOT_MUTEDRecommended
vulnerability.mute.userstringUser who last changed the vulnerability's mute status.user@example.comRecommended
vulnerability.parent.davis_assessment.assessment_modestringAvailability of the information based on which the parent vulnerability assessment has been done.FULL; NOT_AVAILABLE; REDUCEDRecommended
vulnerability.parent.davis_assessment.data_assets_statusstringParent vulnerability's reachability of related data assets by affected entities.NOT_AVAILABLE; NOT_DETECTED; REACHABLERecommended
vulnerability.parent.davis_assessment.exposure_statusstringParent vulnerability's internet exposure status.NOT_AVAILABLE; NOT_DETECTED; PUBLIC_NETWORKRecommended
vulnerability.parent.davis_assessment.levelstringParent vulnerability's Davis Security Score level.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.parent.davis_assessment.scoredoubleParent vulnerability's Davis Security Score (1-10) calculated by Dynatrace.8.1Recommended
vulnerability.parent.davis_assessment.vulnerable_function_statusstringUsage status of vulnerable functions causing the parent vulnerability. Status is IN_USE when there's at least one vulnerable function in use by an application.IN_USE; NOT_AVAILABLE; NOT_IN_USERecommended
vulnerability.parent.first_seenstringTimestamp of when the parent vulnerability was first detected.2023-03-22T13:19:36.945ZRecommended
vulnerability.parent.mute.change_datetimestampTimestamp of the last mute or unmute action of the parent vulnerability.2023-03-22T13:19:36.945ZRecommended
vulnerability.parent.mute.reasonstringThe reason for muting or unmuting the parent vulnerability.Muted: False positiveRecommended
vulnerability.parent.mute.statusstringParent vulnerability's mute status.MUTED; NOT_MUTEDRecommended
vulnerability.parent.mute.userstringUser who last changed the parent vulnerability's mute status.user@example.comRecommended
vulnerability.parent.resolution.change_datestringTimestamp of the parent vulnerability's last status change.2023-03-22T13:19:37.466ZRecommended
vulnerability.parent.resolution.statusstringCurrent status of the parent vulnerability.OPEN; RESOLVEDRecommended
vulnerability.parent.risk.levelstringParent vulnerability's risk score level defined by the provider. For Dynatrace, the Davis Security Score level.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.parent.risk.scoredoubleParent vulnerability's risk score defined by the provider. For Dynatrace, the Davis Security Score.8.1Recommended
vulnerability.references.cvestring[]List of the vulnerability's CVE IDs.[CVE-2021-41079]Recommended
vulnerability.references.cwestring[]List of the vulnerability's CWE IDs.[CWE-20]Recommended
vulnerability.references.owaspstring[]List of vulnerability's OWASP IDs.[2021:A3]Recommended
vulnerability.resolution.change_datetimestampTimestamp of the vulnerability's last status change.2023-03-22T13:19:37.466ZRecommended
vulnerability.resolution.statusstringVulnerability's resolution status.OPEN; RESOLVEDRecommended
vulnerability.risk.levelstringVulnerability's risk score level defined by the provider. For Dynatrace, the Davis Security Score level.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.risk.scalestringScale by which the vulnerability's risk score and risk score level defined by the provider are measured.Dynatrace security scoreRecommended
vulnerability.risk.scoredoubleVulnerability's risk score defined by the provider. For Dynatrace, the Davis Security Score.8.1Recommended
vulnerability.stackstringLevel of the vulnerable component in the technological stack.CODE; CODE_LIBRARY; SOFTWARE; CONTAINER_ORCHESTRATIONRecommended
vulnerability.technologystringTechnology of the vulnerable component.JAVA; DOT_NET; GO; PHP; NODE_JS; KUBERNETESRecommended
vulnerability.titlestringTitle of the vulnerability.Improper Input ValidationRecommended
vulnerability.typestringClassification of the vulnerability based on commonly accepted enums, such as CWE.Improper Input ValidationRecommended
vulnerability.urlstringDynatrace URL to the details page of the vulnerability.https://example.comRecommended

Entity state: Environmental data

This section contains information about the vulnerability's affected and related entities.

Affected entities

AttributeTypeDescriptionExamplesRequirement Level
affected_entity.affected_processes.idsarrayIDs of the processes that are currently affected by the vulnerability.PROCESS_GROUP_INSTANCE-1Recommended
affected_entity.affected_processes.namesarrayNames of the processes that are currently affected by the vulnerability.PROCESS_GROUP_INSTANCE-1Recommended
affected_entity.idstringID of the affected entity.PROCESS_GROUP-1; HOST-1Recommended
affected_entity.management_zones.idsarrayIDs of the management zones to which the affected entity belongs.mzid1Recommended
affected_entity.management_zones.namesarrayNames of the management zones to which the affected entity belongs.mz1Recommended
affected_entity.monitored_processes.countlongNumber of affected processes.100Recommended
affected_entity.typestringType of affected entity.PROCESS_GROUP; HOSTRecommended
affected_entity.vulnerable_component.idstringID of the vulnerable component causing the vulnerability.SOFTWARE_COMPONENT-D8FCFFB4FDF7A3FFRecommended
affected_entity.vulnerable_component.namestringName of the vulnerable component causing the vulnerability.log4j-core-2.6.2.jarRecommended
affected_entity.vulnerable_component.short_namestringShort name of the vulnerable component causing the vulnerability.log4jRecommended
affected_entity.vulnerable_functionsarrayList of vulnerable functions detected to contain the vulnerability within the library.org.springframework.beans.CachedIntrospectionResults:initRecommended

Related entities

AttributeTypeDescriptionExamplesRequirement Level
related_entities.applications.countlongNumber of related applications.1Recommended
related_entities.applications.idsarrayIDs of the applications related to the vulnerability's affected entities.APPLICATION-1Recommended
related_entities.databases.countlongNumber of related databases.1Recommended
related_entities.databases.idsarrayIDs of the databases related to the vulnerability's affected entities.DATABASE-1Recommended
related_entities.hosts.countlongNumber of related hosts.1Recommended
related_entities.hosts.idsarrayIDs of the hosts related to the vulnerability's affected entities.HOST-1Recommended
related_entities.kubernetes_clusters.countlongNumber of related Kubernetes clusters.1Recommended
related_entities.kubernetes_clusters.idsarrayIDs of the Kubernetes clusters related to the vulnerability's affected entities.KUBERNETES_CLUSTER-1Recommended
related_entities.kubernetes_workloads.countlongNumber of related Kubernetes workloads.1Recommended
related_entities.kubernetes_workloads.idsarrayIDs of the Kubernetes workloads related to the vulnerability's affected entities.KUBERNETES_WORKLOAD-1Recommended
related_entities.services.countlongNumber of related services.1Recommended
related_entities.services.idsarrayIDs of the services related to the vulnerability's affected entities.SERVICE-1Recommended

Vulnerability state events

Vulnerability state events are the overall historical vulnerability states per vulnerability level.

The current vulnerability state is exported to Grail regularly.

sql
fetch events | filter event.kind == "SECURITY_EVENT" | filter event.category == "VULNERABILITY_MANAGEMENT" | filter event.type == "VULNERABILITY_STATE_REPORT_EVENT" | filter event.level == "VULNERABILITY"

Vulnerability state: Event data

This section contains general event information.

AttributeTypeDescriptionExamplesRequirement Level
event.categorystringCategorization based on the product and data generating this event.VULNERABILITY_MANAGEMENTRecommended
event.descriptionstringThe human-readable description text of an event.S-49 Remote Code Execution state event reportedRecommended
event.group_labelstringGroup label of an event.STATE_REPORTRecommended
event.kindstringGives high-level information about what kind of information the event contains, without being specific about the contents of the event. Helps to determine the record type of a raw event.
Tags: permission
SECURITY_EVENTRecommended
event.levelstringMain reference point to which the event or data is related. Possible values are Vulnerability (shows the global aggregation across the entire environment and comprises all entities and management zones) and Entity (shows the assessment based on the entity itself).VULNERABILITYRecommended
event.namestringThe human-readable display name of an event type.Vulnerability historical state report eventRecommended
event.providerstringSource of the event, for example the name of the component or system that generated the event.
Tags: permission
Dynatrace; SnykRecommended
event.provider_productstringName of the product providing this event.Runtime Vulnerability Analytics; Snyk ContainerRecommended
event.statusstringStatus of an event as being either Active or Closed.OPEN; RESOLVED; MUTEDRecommended
event.typestringThe unique type identifier of a given event.
Tags: permission
VULNERABILITY_STATE_REPORT_EVENTRecommended
timestamptimestampThe time (UNIX Epoch time in nanoseconds) when the event originated, typically when it was created by the source. If no original timestamp is available, it will be populated at ingest time. Required for all events. In case of a correlated event (for example, ITIL events) this time could be different from the event.start time, as this time represents the actual timestamp when the "update" for the event was created.1649822520123123123Recommended

Vulnerability state: Vulnerability data

This section contains information about the vulnerability.

AttributeTypeDescriptionExamplesRequirement Level
vulnerability.cvss.base_scoredoubleVulnerability's CVSS base score provided by NVD.8.1Recommended
vulnerability.cvss.versionstringVulnerability's CVSS score version.3.1Recommended
vulnerability.davis_assessment.assessment_modestringAvailability of the information based on which the vulnerability assessment has been done.FULL; NOT_AVAILABLE; REDUCEDRecommended
vulnerability.davis_assessment.data_assets_statusstringVulnerability's reachability of related data assets by affected entities.NOT_AVAILABLE; NOT_DETECTED; REACHABLERecommended
vulnerability.davis_assessment.exploit_statusstringVulnerability's public exploits status.AVAILABLE; NOT_AVAILABLERecommended
vulnerability.davis_assessment.exposure_statusstringVulnerability's internet exposure status.NOT_AVAILABLE; NOT_DETECTED; PUBLIC_NETWORKRecommended
vulnerability.davis_assessment.levelstringVulnerability's risk level based on Davis Security Score.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.davis_assessment.scoredoubleVulnerability's Davis Security Score (1-10) calculated by Dynatrace.8.1Recommended
vulnerability.davis_assessment.vulnerable_function_statusstringUsage status of the vulnerable functions causing the vulnerability.IN_USE; NOT_AVAILABLE; NOT_IN_USERecommended
vulnerability.descriptionstringDescription of the vulnerability.More detailed description about improper input validation vulnerability.Recommended
vulnerability.display_idstringDynatrace user-readable identifier for the vulnerability.S-1234Recommended
vulnerability.external_idstringExternal provider's unique identifier for the vulnerability.SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30646Recommended
vulnerability.external_urlstringExternal provider's URL to the details page of the vulnerability.https://example.comRecommended
vulnerability.first_seentimestampTimestamp of when the vulnerability was first detected.2023-03-22T13:19:36.945ZRecommended
vulnerability.idstringDynatrace unique identifier for the vulnerability.2039861408676243188Recommended
vulnerability.mute.change_datetimestampTimestamp of the vulnerability's last muted or unmuted action.2023-03-22T13:19:36.945ZRecommended
vulnerability.mute.reasonstringReason for muting or unmuting the vulnerability.Muted: False positiveRecommended
vulnerability.mute.statusstringVulnerability's mute status.MUTED; NOT_MUTEDRecommended
vulnerability.mute.userstringUser who last changed the vulnerability's mute status.user@example.comRecommended
vulnerability.references.cvestring[]List of the vulnerability's CVE IDs.[CVE-2021-41079]Recommended
vulnerability.references.cwestring[]List of the vulnerability's CWE IDs.[CWE-20]Recommended
vulnerability.references.owaspstring[]List of vulnerability's OWASP IDs.[2021:A3]Recommended
vulnerability.resolution.change_datetimestampTimestamp of the vulnerability's last status change.2023-03-22T13:19:37.466ZRecommended
vulnerability.resolution.statusstringVulnerability's resolution status.OPEN; RESOLVEDRecommended
vulnerability.risk.levelstringVulnerability's risk score level defined by the provider. For Dynatrace, the Davis Security Score level.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.risk.scalestringScale by which the vulnerability's risk score and risk score level defined by the provider are measured.Dynatrace security scoreRecommended
vulnerability.risk.scoredoubleVulnerability's risk score defined by the provider. For Dynatrace, the Davis Security Score.8.1Recommended
vulnerability.stackstringLevel of the vulnerable component in the technological stack.CODE; CODE_LIBRARY; SOFTWARE; CONTAINER_ORCHESTRATIONRecommended
vulnerability.technologystringTechnology of the vulnerable component.JAVA; DOT_NET; GO; PHP; NODE_JS; KUBERNETESRecommended
vulnerability.titlestringTitle of the vulnerability.Improper Input ValidationRecommended
vulnerability.typestringClassification of the vulnerability based on commonly accepted enums, such as CWE.Improper Input ValidationRecommended
vulnerability.urlstringDynatrace URL to the details page of the vulnerability.https://example.comRecommended

Vulnerability state: Environmental data

This section contains information on the vulnerability's affected and related entities.

Affected entities

AttributeTypeDescriptionExamplesRequirement Level
affected_entities.affected_processes.countlongNumber of affected processes.50Recommended
affected_entities.countlongNumber of affected entities.1Recommended
affected_entities.hosts.countlongNumber of affected hosts.2Recommended
affected_entities.kubernetes_nodes.countlongNumber of affected nodes.2Recommended
affected_entities.management_zones.idsarrayIDs of the management zones to which the affected entities belong.mzid1Recommended
affected_entities.management_zones.namesarrayNames of the management zones to which the affected entities belong.mz1Recommended
affected_entities.monitored_processes.countlongNumber of processes of the process group.100Recommended
affected_entities.process_groups.countlongNumber of affected process groups.2Recommended
affected_entities.typesarrayTypes of affected entities.PROCESS_GROUP; HOSTRecommended
affected_entities.vulnerable_components.idsarrayDynatrace IDs of the vulnerable components causing the vulnerability.SOFTWARE_COMPONENT-0000000000000001; SOFTWARE_COMPONENT-0000000000000002; SOFTWARE_COMPONENT-0000000000000003Recommended
affected_entities.vulnerable_components.namesarrayNames of the vulnerable components causing the vulnerability.com.fasterxml.jackson.core:jackson-databind:2.10.0; node-sass:4.14.1Recommended
affected_entities.vulnerable_functionsarrayVulnerable functions detected to contain the vulnerability within the library.org.example.class.ApiImplementation:initMethodRecommended

Related entities

AttributeTypeDescriptionExamplesRequirement Level
related_entities.applications.countlongNumber of related applications.1Recommended
related_entities.databases.countlongNumber of related databases.1Recommended
related_entities.hosts.countlongNumber of related hosts.1Recommended
related_entities.kubernetes_clusters.countlongNumber of related Kubernetes clusters.1Recommended
related_entities.kubernetes_workloads.countlongNumber of related Kubernetes workloads.1Recommended
related_entities.services.countlongNumber of related services.1Recommended

Vulnerability change events

Vulnerability change events are overall change events per vulnerability-level.

An event is generated whenever a vulnerability undergoes a status or assessment change.

sql
fetch events | filter event.kind == "SECURITY_EVENT" | filter event.category == "VULNERABILITY_MANAGEMENT" | filter event.type == "VULNERABILITY_STATUS_CHANGE_EVENT" fetch events | filter event.kind == "SECURITY_EVENT" | filter event.category == "VULNERABILITY_MANAGEMENT" | filter event.type == "VULNERABILITY_ASSESSMENT_CHANGE_EVENT"

Vulnerability change: Event data

This section contains general event information.

AttributeTypeDescriptionExamplesRequirement Level
event.categorystringStandard categorization based on the significance of an event according to the ITIL event management standard (previously known as severity level).VULNERABILITY_MANAGEMENTRecommended
event.descriptionstringThe human-readable description text of an event.S-49 Remote Code Execution status has changed to OPEN.; S-49 Remote Code Execution assessment has changed.Recommended
event.group_labelstringGroup label of an event.CHANGE_EVENTRecommended
event.kindstringHigh-level information about what kind of information the event contains, without being specific about the contents of the event. Helps to determine the record type of a raw event.
Tags: permission
SECURITY_EVENTRecommended
event.levelstringMain reference point to which the event or data is related. Possible values are Vulnerability (shows the global aggregation across the entire environment and comprises all entities and management zones) and Entity (shows the assessment based on the entity itself).VULNERABILITYRecommended
event.namestringThe human-readable display name of an event type.Vulnerability status change event; Vulnerability assessment change eventRecommended
event.providerstringSource of the event, for example the name of the component or system that generated the event.
Tags: permission
DynatraceRecommended
event.provider_productstringName of the product providing this event.Runtime Vulnerability Analytics; Snyk ContainerRecommended
event.statusstringStatus of an event as being either Active or Closed.OPEN; RESOLVED; MUTEDRecommended
event.status_transitionstringAn enum that shows the transition of the above event state.NEW_OPEN; REOPEN; CLOSE; MUTE; UNMUTERecommended
event.trigger.typestringType of event trigger (for example, whether it was generated by the system, ingested via API, or triggered by the user).DT_PLATFORM; USER_ACTIONRecommended
event.trigger.userstringID of the user who triggered the event. If generated by Dynatrace, the value is SYSTEM.SYSTEM; <user_id>Recommended
event.typestringThe unique type identifier of a given event.
Tags: permission
VULNERABILITY_STATUS_CHANGE_EVENT; VULNERABILITY_ASSESSMENT_CHANGE_EVENTRecommended
timestamptimestampThe time (UNIX Epoch time in nanoseconds) when the event originated, typically when it was created by the source. If no original timestamp is available, it will be populated at ingest time. Required for all events. In case of a correlated event (for example, ITIL events) this time could be different from the event.start time, as this time represents the actual timestamp when the "update" for the event was created.1649822520123123123Recommended

Vulnerability change: Vulnerability data

This section contains information about the vulnerability and its status and assessment changes.

AttributeTypeDescriptionExamplesRequirement Level
vulnerability.cvss.base_scoredoubleVulnerability's CVSS base score provided by NVD.8.1Recommended
vulnerability.cvss.versionstringVulnerability's CVSS score version.3.1Recommended
vulnerability.davis_assessment.assessment_modestringAvailability of the information based on which the vulnerability assessment has been done.FULL; NOT_AVAILABLE; REDUCEDRecommended
vulnerability.davis_assessment.data_assets_statusstringVulnerability's reachability of related data assets by affected entities.NOT_AVAILABLE; NOT_DETECTED; REACHABLERecommended
vulnerability.davis_assessment.exploit_statusstringVulnerability's public exploits status.AVAILABLE; NOT_AVAILABLERecommended
vulnerability.davis_assessment.exposure_statusstringVulnerability's internet exposure status.NOT_AVAILABLE; NOT_DETECTED; PUBLIC_NETWORKRecommended
vulnerability.davis_assessment.levelstringVulnerability's risk level based on Davis Security Score.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.davis_assessment.scoredoubleVulnerability's Davis Security Score (1-10) calculated by Dynatrace.8.1Recommended
vulnerability.davis_assessment.vulnerable_function_statusstringUsage status of the vulnerable functions causing the vulnerability.IN_USE; NOT_AVAILABLE; NOT_IN_USERecommended
vulnerability.descriptionstringDescription of the vulnerability.More detailed description about improper input validation vulnerability.Recommended
vulnerability.display_idstringDynatrace user-readable identifier for the vulnerability.S-1234Recommended
vulnerability.event_change_listarrayList of vulnerability attributes updated as part of the change event. Values in the list match a previous field.vulnerability.risk.score; vulnerability.davis_assessment.score; vulnerability.davis_assessment.data_assets_status; vulnerability.davis_assessment.exploit_status; vulnerability.davis_assessment.exposure_statusRecommended
vulnerability.external_idstringExternal provider's unique identifier for the vulnerability.SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-30646Recommended
vulnerability.external_urlstringExternal provider's URL to the details page of the vulnerability.https://example.comRecommended
vulnerability.first_seentimestampTimestamp of when the vulnerability was first detected.2023-03-22T13:19:36.945ZRecommended
vulnerability.idstringDynatrace unique identifier for the vulnerability.2039861408676243188Recommended
vulnerability.mute.change_datetimestampTimestamp of the vulnerability's last muted or unmuted action.2023-03-22T13:19:36.945ZRecommended
vulnerability.mute.reasonstringReason for muting or unmuting the vulnerability.Muted: False positiveRecommended
vulnerability.mute.statusstringVulnerability's mute status.MUTED; NOT_MUTEDRecommended
vulnerability.mute.userstringUser who last changed the vulnerability's mute status.user@example.comRecommended
vulnerability.previous.cvss.basedoubleVulnerability's previous CVSS base score (in case the CVSS base score has changed).8.1Recommended
vulnerability.previous.davis_assessment.data_assets_statusstringVulnerability's previous reachability of related data assets by affected entities (in case the reachability has changed).NOT_AVAILABLE; NOT_DETECTED; REACHABLERecommended
vulnerability.previous.davis_assessment.exploit_statusstringVulnerability's previous public exploit status (in case the public exploit status has changed).AVAILABLE; NOT_AVAILABLERecommended
vulnerability.previous.davis_assessment.exposure_statusstringVulnerability's previous internet exposure status (in case the internet exposure status has changed).NOT_AVAILABLE; NOT_DETECTED; PUBLIC_NETWORKRecommended
vulnerability.previous.davis_assessment.levelstringVulnerability's previous risk level (in case the risk level has changed).LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.previous.davis_assessment.scoredoubleVulnerability's previous Davis Security Score (in case Davis Security Score has changed).8.1Recommended
vulnerability.previous.davis_assessment.vulnerable_function_statusstringVulnerability's previous vulnerable function status (in case the vulnerable function status has changed).IN_USE; NOT_AVAILABLE; NOT_IN_USERecommended
vulnerability.previous.mute.change_datestringTimestamp of the vulnerability's previous mute status (in case the mute status has changed).2023-03-22T13:19:36.945ZRecommended
vulnerability.previous.mute.reasonstringReason for last muting or unmuting the vulnerability (in case the reason for muting or unmuting the vulnerability has changed).Muted: False positiveRecommended
vulnerability.previous.mute.statusstringVulnerability's previous mute status (in case the mute status has changed).MUTED; NOT_MUTEDRecommended
vulnerability.previous.mute.userstringUser who last changed the vulnerability's mute status (in case the mute status was last changed by a different user).user@example.comRecommended
vulnerability.previous.resolution.statusstringVulnerability's previous resolution status (in case the resolution status has changed).OPEN; RESOLVEDRecommended
vulnerability.previous.risk.levelstringVulnerability's previous risk score level (in case the risk score level has changed).LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.previous.risk.scoredoubleVulnerability's previous risk score (in case the risk score has changed).8.1Recommended
vulnerability.references.cvestring[]List of the vulnerability's CVE IDs.[CVE-2021-41079]Recommended
vulnerability.references.cwestring[]List of the vulnerability's CWE IDs.[CWE-20]Recommended
vulnerability.references.owaspstring[]List of vulnerability's OWASP IDs.[2021:A3]Recommended
vulnerability.resolution.change_datetimestampTimestamp of the vulnerability's last status change.2023-03-22T13:19:37.466ZRecommended
vulnerability.resolution.statusstringVulnerability's resolution status.OPEN; RESOLVEDRecommended
vulnerability.risk.levelstringVulnerability's risk score level defined by the provider. For Dynatrace, the Davis Security Score level.LOW; MEDIUM; HIGH; CRITICALRecommended
vulnerability.risk.scalestringScale by which the vulnerability's risk score and risk score level defined by the provider are measured.Dynatrace security scoreRecommended
vulnerability.risk.scoredoubleVulnerability's risk score defined by the provider. For Dynatrace, the Davis Security Score.8.1Recommended
vulnerability.stackstringLevel of the vulnerable component in the technological stack.CODE; CODE_LIBRARY; SOFTWARE; CONTAINER_ORCHESTRATIONRecommended
vulnerability.technologystringTechnology of the vulnerable component.JAVA; DOT_NET; GO; PHP; NODE_JS; KUBERNETESRecommended
vulnerability.titlestringTitle of the vulnerability.Improper Input ValidationRecommended
vulnerability.typestringClassification of the vulnerability based on commonly accepted enums, such as CWE.Improper Input ValidationRecommended
vulnerability.urlstringDynatrace URL to the details page of the vulnerability.https://example.comRecommended

Vulnerability change: Environmental data

This section contains information on changes regarding vulnerability's affected and related entities.

Affected entities

AttributeTypeDescriptionExamplesRequirement Level
affected_entities.countlongNumber of affected entities.1Recommended
affected_entities.event_change_listarrayList of affected entity attributes updated as part of the change event. Values in the list match a previous field.affected_entities.count; affected_entities.process_groups.count; affected_entities.kubernetes_nodes.countRecommended
affected_entities.hosts.countlongNumber of affected hosts.2Recommended
affected_entities.kubernetes_nodes.countlongNumber of affected nodes.2Recommended
affected_entities.previous.countlongNumber of affected entities before the last change event.1Recommended
affected_entities.previous.hosts.countlongNumber of affected hosts before the last change event.5Recommended
affected_entities.previous.kubernetes_nodes.countlongNumber of affected Kubernetes nodes before the last change event.5Recommended
affected_entities.previous.process_groups.countlongNumber of affected process groups before the last change event.2Recommended
affected_entities.process_groups.countlongNumber of affected process groups.2Recommended
affected_entities.typesarrayTypes of affected entities.PROCESS_GROUP; HOSTRecommended

Related entities

AttributeTypeDescriptionExamplesRequirement Level
related_entities.databases.countlongNumber of related databases.1Recommended
related_entities.event_change_listarrayList of related entity attributes updated as part of the change event. Values in the list match a previous field.related_entities.databases.countRecommended
related_entities.previous.databases.countlongNumber of related databases before the last change event.1Recommended