Lists the third-party and code-level vulnerabilities detected in your applications.
The request produces an application/json
payload.
GET | SaaS | https://{your-environment-id}.live.dynatrace.com/api/v2/securityProblems |
Environment ActiveGateCluster ActiveGate | https://{your-activegate-domain}:9999/e/{your-environment-id}/api/v2/securityProblems |
To execute this request, you need an access token with securityProblems.read
scope.
To learn how to obtain and use it, see Tokens and authentication.
The cursor for the next page of results. You can find it in the nextPageKey field of the previous response.
The first page is always returned if you don't specify the nextPageKey query parameter.
When the nextPageKey is set to obtain subsequent pages, you must omit all other query parameters.
The amount of security problems in a single response payload.
The maximal allowed page size is 500.
If not set, 100 is used.
Defines the scope of the query. Only security problems matching the specified criteria are included in the response.
You can add one or more of the following criteria. Values are not case-sensitive and the EQUALS
operator is used unless otherwise specified.
status("value")
. Find the possible values in the description of the status field of the response. If not set, all security problems are returned.muted("value")
. Possible values are TRUE
or FALSE
.riskLevel("value")
. The Davis risk level. Find the possible values in the description of the riskLevel field of the response.minRiskScore("5.5")
. The Davis minimum risk score. The GREATER THAN OR EQUAL TO
operator is used. Specify a number between 1.0
and 10.0
.maxRiskScore("5.5")
. The Davis maximum risk score. The LESS THAN
operator is used. Specify a number between 1.0
and 10.0
.baseRiskLevel("value")
. The Base risk level from the CVSS. Find the possible values in the description of the riskLevel field of the response.minBaseRiskScore("5.5")
. The minimum base risk score from the CVSS. The GREATER THAN OR EQUAL TO
operator is used. Specify a number between 1.0
and 10.0
.maxBaseRiskScore("5.5")
. The maximum base risk score from the CVSS. The LESS THAN
operator is used. Specify a number between 1.0
and 10.0
.externalVulnerabilityIdContains("id-1")
. The CONTAINS
operator is used. Maximum value length is 48 characters.externalVulnerabilityId("id-1", "id-2")
.cveId("id")
.riskAssessment("value-1", "value-2")
Possible values are EXPOSED
, SENSITIVE
, EXPLOIT
, VULNERABLE_FUNCTION_IN_USE
and ACCURACY_REDUCED
.relatedHostIds("value-1", "value-2")
. Specify Dynatrace entity IDs here.relatedHostNames("value-1", "value-2")
. Values are case-sensitive.relatedHostNameContains("value-1")
. The CONTAINS
operator is used.relatedKubernetesClusterIds("value-1", "value-2")
. Specify Dynatrace entity IDs here.relatedKubernetesClusterNames("value-1", "value-2")
. Values are case-sensitive.relatedKubernetesClusterNameContains("value-1")
. The CONTAINS
operator is used.relatedKubernetesWorkloadIds("value-1", "value-2")
. Specify Dynatrace entity IDs here.relatedKubernetesWorkloadNames("value-1", "value-2")
. Values are case-sensitive.relatedKubernetesWorkloadNameContains("value-1")
. The CONTAINS
operator is used.managementZoneIds("mzId-1", "mzId-2")
.managementZones("name-1", "name-2")
. Values are case-sensitive.affectedPgiIds("pgiId-1", "pgiId-2")
. Specify Dynatrace entity IDs here.affectedPgIds("pgId-1", "pgId-2")
. Specify Dynatrace entity IDs here.affectedPgNames("name-1", "name-2")
. Values are case-sensitive.affectedPgNameContains("name-1")
. The CONTAINS
operator is used.vulnerableComponentIds("componentId-1", "componentId-2")
. Specify component IDs here.vulnerableComponentNames("name-1", "name-2")
. Values are case-sensitive.vulnerableComponentNameContains("name-1")
. The CONTAINS
operator is used.hostTags("hostTag-1")
. The CONTAINS
operator is used. Maximum value length is 48 characters.pgTags("pgTag-1")
. The CONTAINS
operator is used. Maximum value length is 48 characters.pgiTags("pgiTag-1")
. The CONTAINS
operator is used. Maximum value length is 48 characters.tags("tag-1")
. The CONTAINS
operator is used. This selector picks hosts, process groups, and process group instances at the same time. Maximum value length is 48 characters.displayIds("S-1234", "S-5678")
. The EQUALS
operator is used.securityProblemIds("12544152654387159360", "5904857564184044850")
. The EQUALS
operator is used.technology("technology-1", "technology-2")
. Find the possible values in the description of the technology field of the response. The EQUALS
operator is used.vulnerabilityType("type-1", "type-2")
. Possible values are THIRD_PARTY
, CODE_LEVEL
, RUNTIME
.Risk score and risk category are mutually exclusive (cannot be used at the same time).
To set several criteria, separate them with a comma (,
). Only results matching all criteria are included in the response.
Specify the value of a criterion as a quoted string. The following special characters must be escaped with a tilde (~
) inside quotes:
~
"
Specifies one or more fields for sorting the security problem list. Multiple fields can be concatenated using a comma (,
) as a separator (e.g. +status,-timestamp
).
You can sort by the following properties with a sign prefix for the sorting order.
status
: The security problem status (+
open first or -
resolved first)muted
: The security problem mute state (+
unmuted first or -
muted first)technology
: The security problem technologyfirstSeenTimestamp
: The timestamp of the first occurrence of the security problem (+
new problems first or -
old problems first)lastUpdatedTimestamp
: The timestamp of the last update of the security problem (+
recently updated problems first or -
earlier updated problems first)securityProblemId
: The auto-generated ID of the security problem (+
lower number first or -
higher number first)externalVulnerabilityId
: The ID of the external vulnerability (+
lower number first or -
higher number first)displayId
: The display ID (+
lower number first or -
higher number first)riskAssessment.riskScore
: Davis Security Score (+
lower score first or -
higher score first)riskAssessment.riskLevel
: Davis Security Score level (+
lower level first or -
higher level first)riskAssessment.exposure
: Whether the problem is exposed to the internetriskAssessment.baseRiskScore
: The CVSS score (+
lower score first or -
higher score first)riskAssessment.baseRiskLevel
: The CVSS level (+
lower level first or -
higher level first)riskAssessment.dataAssets
: Whether data assets are affectedriskAssessment.vulnerableFunctionUsage
: Whether vulnerable functions are usedriskAssessment.assessmentAccuracy
: The assessments accuracy (+
less accuracy first or -
more accuracy first)globalCounts.affectedNodes
: Number of affected nodes (+
lower number first or -
higher number first)globalCounts.affectedProcessGroupInstances
: Number of affected process group instances (+
lower number first or -
higher number first)globalCounts.affectedProcessGroups
: Number of affected process groups (+
lower number first or -
higher number first)globalCounts.exposedProcessGroups
: Number of exposed process groups (+
lower number first or -
higher number first)globalCounts.reachableDataAssets
: Number of reachable data assets (+
lower number first or -
higher number first)globalCounts.relatedApplications
: Number of related applications (+
lower number first or -
higher number first)globalCounts.relatedAttacks
: Number of attacks on the security problem (+
lower number first or -
higher number first)globalCounts.relatedHosts
: Number of related hosts (+
lower number first or -
higher number first)globalCounts.relatedKubernetesClusters
: Number of related Kubernetes cluster (+
lower number first or -
higher number first)globalCounts.relatedKubernetesWorkloads
: Number of related Kubernetes workloads (+
lower number first or -
higher number first)globalCounts.relatedServices
: Number of related services (+
lower number first or -
higher number first)globalCounts.vulnerableComponents
: Number of vulnerable components (+
lower number first or -
higher number first)If no prefix is set, +
is used.
A list of additional security problem properties you can add to the response.
The following properties are available (all other properties are always included and you can't remove them from the response):
riskAssessment
: A risk assessment of the security problem.managementZones
: The management zone where the security problem occurred.codeLevelVulnerabilityDetails
: Details of the code-level vulnerability.globalCounts
: Globally calculated statistics about the security problem. No management zone information is taken into account.To add properties, specify them in a comma-separated list and prefix each property with a plus (for example, +riskAssessment,+managementZones
).
The start of the requested timeframe.
You can use one of the following formats:
2021-01-25T05:57:01.123+01:00
. If no time zone is specified, UTC is used. You can use a space character instead of the T
. Seconds and fractions of a second are optional.now-NU/A
, where N
is the amount of time, U
is the unit of time, and A
is an alignment. The alignment rounds all the smaller values to the nearest zero in the past. For example, now-1y/w
is one year back, aligned by a week.
You can also specify relative timeframe without an alignment: now-NU
.
Supported time units for the relative timeframe are:
m
: minutesh
: hoursd
: daysw
: weeksM
: monthsy
: yearsIf not set, the relative timeframe of thirty days is used (now-30d
).
The end of the requested timeframe.
You can use one of the following formats:
2021-01-25T05:57:01.123+01:00
. If no time zone is specified, UTC is used. You can use a space character instead of the T
. Seconds and fractions of a second are optional.now-NU/A
, where N
is the amount of time, U
is the unit of time, and A
is an alignment. The alignment rounds all the smaller values to the nearest zero in the past. For example, now-1y/w
is one year back, aligned by a week.
You can also specify relative timeframe without an alignment: now-NU
.
Supported time units for the relative timeframe are:
m
: minutesh
: hoursd
: daysw
: weeksM
: monthsy
: yearsIf not set, the current timestamp is used.
The end of the timeframe must not be older than 365 days.
SecurityProblemList
objectA list of security problems.
The cursor for the next page of results. Has the value of null
on the last page.
Use it in the nextPageKey query parameter to obtain subsequent pages of the result.
The number of entries per page.
The total number of entries in the result.
SecurityProblem
objectParameters of a security problem
The details of a code-level vulnerability.
A list of CVE IDs of the security problem.
The display ID of the security problem.
The external vulnerability ID of the security problem.
The timestamp of the first occurrence of the security problem.
Globally calculated statistics about the security problem. No management zone information is taken into account.
The timestamp when the security problem was last opened.
The timestamp when the security problem was last resolved.
The timestamp of the most recent security problem change.
The security problem is (true
) or is not (false
) muted.
The package name of the security problem.
The ID of the security problem.
The status of the security problem.
OPEN
RESOLVED
The technology of the security problem.
DOTNET
GO
JAVA
KUBERNETES
NODE_JS
PHP
PYTHON
The title of the security problem.
The URL to the security problem details page.
The type of the vulnerability.
CODE_LEVEL
RUNTIME
THIRD_PARTY
CodeLevelVulnerabilityDetails
objectThe details of a code-level vulnerability.
The list of encoded MEIdentifier of the process groups.
The list of affected process groups.
The code location of the vulnerability without package and parameter.
The type of code level vulnerability.
CMD_INJECTION
IMPROPER_INPUT_VALIDATION
SQL_INJECTION
SSRF
The code location of the vulnerability.
The vulnerable function of the vulnerability.
Describes what got passed into the code level vulnerability.
VulnerableFunctionInput
objectDescribes what got passed into the code level vulnerability.
The type of the input.
COMMAND
HTTP_CLIENT
JNDI
SQL_STATEMENT
VulnerableFunctionInputSegment
objectDescribes one segment that was passed into a vulnerable function.
The type of the input segment.
MALICIOUS_INPUT
REGULAR_INPUT
TAINTED_INPUT
The value of the input segment.
GlobalCountsDto
objectGlobally calculated statistics about the security problem. No management zone information is taken into account.
Number of affected nodes
Number of affected process group instances
Number of affected process groups
Number of exposed process groups
Number of reachable data assets exposed
Number of related applications
Number of attacks on the exposed security problem
Number of related hosts
Number of related kubernetes cluster
Number of related kubernetes workloads
Number of related services
Number of vulnerable components
ManagementZone
objectA short representation of a management zone.
The ID of the management zone.
The name of the management zone.
RiskAssessment
objectRisk assessment of a security problem.
The accuracy of the assessment.
FULL
NOT_AVAILABLE
REDUCED
The risk level from the CVSS score.
CRITICAL
HIGH
LOW
MEDIUM
NONE
The risk score (1-10) from the CVSS score.
The original attack vector of the CVSS assessment.
The reachability of related data assets by affected entities.
NOT_AVAILABLE
NOT_DETECTED
REACHABLE
The level of exposure of affected entities.
NOT_AVAILABLE
NOT_DETECTED
PUBLIC_NETWORK
The availability status of public exploits.
AVAILABLE
NOT_AVAILABLE
The Davis risk level.
It is calculated by Dynatrace on the basis of CVSS score.
CRITICAL
HIGH
LOW
MEDIUM
NONE
The Davis risk score (1-10).
It is calculated by Dynatrace on the basis of CVSS score.
The attack vector calculated by Dynatrace based on the CVSS attack vector.
The state of vulnerable code execution.
IN_USE
NOT_AVAILABLE
NOT_IN_USE
AssessmentAccuracyDetails
objectThe assessment accuracy details.
The reason for a reduced accuracy of the assessment.
LIMITED_AGENT_SUPPORT
LIMITED_BY_CONFIGURATION
{"nextPageKey": "AQAAABQBAAAABQ==","pageSize": 1,"securityProblems": [{"codeLevelVulnerabilityDetails": {"processGroupIds": ["string"],"processGroups": ["string"],"shortVulnerabilityLocation": "string","type": "CMD_INJECTION","vulnerabilityLocation": "string","vulnerableFunction": "string","vulnerableFunctionInput": {"inputSegments": [{"type": "MALICIOUS_INPUT","value": "string"}],"type": "COMMAND"}},"cveIds": ["string"],"displayId": "string","externalVulnerabilityId": "string","firstSeenTimestamp": 1,"globalCounts": {"affectedNodes": 1,"affectedProcessGroupInstances": 1,"affectedProcessGroups": 1,"exposedProcessGroups": 1,"reachableDataAssets": 1,"relatedApplications": 1,"relatedAttacks": 1,"relatedHosts": 1,"relatedKubernetesClusters": 1,"relatedKubernetesWorkloads": 1,"relatedServices": 1,"vulnerableComponents": 1},"lastOpenedTimestamp": 1,"lastResolvedTimestamp": 1,"lastUpdatedTimestamp": 1,"managementZones": [{"id": "string","name": "string"}],"muted": true,"packageName": "string","riskAssessment": {"assessmentAccuracy": "FULL","assessmentAccuracyDetails": {"reducedReasons": ["LIMITED_AGENT_SUPPORT"]},"baseRiskLevel": "CRITICAL","baseRiskScore": 1,"baseRiskVector": "string","dataAssets": "NOT_AVAILABLE","exposure": "NOT_AVAILABLE","publicExploit": "AVAILABLE","riskLevel": "CRITICAL","riskScore": 1,"riskVector": "string","vulnerableFunctionUsage": "IN_USE"},"securityProblemId": "string","status": "OPEN","technology": "DOTNET","title": "string","url": "string","vulnerabilityType": "CODE_LEVEL"}],"totalCount": 1}
Query for top ten open vulnerabilities sorted by risk score in descending order.
Required filters:
fields=%2BriskAssessment
securityProblemSelector=status(OPEN)
sort=-riskAssessment.riskScore
curl -L -X GET 'https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems?pageSize=10&fields=%2BriskAssessment&securityProblemSelector=status(OPEN)&sort=-riskAssessment.riskScore' \-H 'Authorization: Api-Token [your_token]' \-H 'Accept: application/json'
https://mySampleEnv.live.dynatrace.com/api/v2/securityProblems?pageSize=10&fields=%2BriskAssessment&securityProblemSelector=status(OPEN)&sort=-riskAssessment.riskScore
{"totalCount": 306,"pageSize": 10,"nextPageKey": "vu8XQiDj3q0SIU59KgHvowAAAX_qbpspAAABgITtYykAAAAKAQAxc3RhdHVzKE9QRU4pLCB2dWxuZXJhYmlsaXR5VHlwZShUSElSRF9QQVJUWV9TTllLKQI0VT4tJAUu9QMBAQEAAzguNjRVPi0kBS71AgEBAQATNzY3ODM5MzU0NDcwOTM2NjkzMAEADytyaXNrQXNzZXNzbWVudL7vF0Ig496t","securityProblems": [{"securityProblemId": "11497873967941161718","displayId": "S-3454","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2314720","vulnerabilityType": "THIRD_PARTY","title": "Remote Code Execution (RCE)","packageName": "org.apache.logging.log4j:log4j-core","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/11497873967941161718","technology": "JAVA","firstSeenTimestamp": 1639135014832,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "CRITICAL","riskScore": 10.0,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseRiskLevel": "CRITICAL","baseRiskScore": 10.0,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2021-44228"]},{"securityProblemId": "7968806720724378002","displayId": "S-3352","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-CHQOSLOGBACK-31407","vulnerabilityType": "THIRD_PARTY","title": "Arbitrary Code Execution","packageName": "ch.qos.logback:logback-classic","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/7968806720724378002","technology": "JAVA","firstSeenTimestamp": 1629276816755,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "CRITICAL","riskScore": 9.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseRiskLevel": "CRITICAL","baseRiskScore": 9.8,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "NOT_AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2017-5929"]},{"securityProblemId": "13131808379454186608","displayId": "S-3343","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-CHQOSLOGBACK-30208","vulnerabilityType": "THIRD_PARTY","title": "Arbitrary Code Execution","packageName": "ch.qos.logback:logback-core","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/13131808379454186608","technology": "JAVA","firstSeenTimestamp": 1629276816755,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "CRITICAL","riskScore": 9.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseRiskLevel": "CRITICAL","baseRiskScore": 9.8,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "NOT_AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2017-5929"]},{"securityProblemId": "13080692565938470532","displayId": "S-3342","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-31409","vulnerabilityType": "THIRD_PARTY","title": "Deserialization of Untrusted Data","packageName": "org.apache.logging.log4j:log4j-core","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/13080692565938470532","technology": "JAVA","firstSeenTimestamp": 1629276816755,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "CRITICAL","riskScore": 9.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseRiskLevel": "CRITICAL","baseRiskScore": 9.8,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2017-5645"]},{"securityProblemId": "12458843765122204362","displayId": "S-3337","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-LOG4J-572732","vulnerabilityType": "THIRD_PARTY","title": "Deserialization of Untrusted Data","packageName": "log4j:log4j","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/12458843765122204362","technology": "JAVA","firstSeenTimestamp": 1629276816755,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "CRITICAL","riskScore": 9.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseRiskLevel": "CRITICAL","baseRiskScore": 9.8,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2019-17571"]},{"securityProblemId": "10489033029364122206","displayId": "S-3457","status": "OPEN","muted": false,"externalVulnerabilityId": "SNYK-JAVA-ORGAPACHELOGGINGLOG4J-2320014","vulnerabilityType": "THIRD_PARTY","title": "Remote Code Execution (RCE)","packageName": "org.apache.logging.log4j:log4j-core","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/10489033029364122206","technology": "JAVA","firstSeenTimestamp": 1639510404699,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "CRITICAL","riskScore": 9.0,"riskVector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","baseRiskLevel": "CRITICAL","baseRiskScore": 9.0,"baseRiskVector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2021-45046"]},{"securityProblemId": "16904121786356925180","displayId": "S-3534","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-ORGAPACHESTRUTS-30207","vulnerabilityType": "THIRD_PARTY","title": "Arbitrary Code Execution","packageName": "org.apache.struts:struts2-core","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/16904121786356925180","technology": "JAVA","firstSeenTimestamp": 1647434489381,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "HIGH","riskScore": 8.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/MAV:A/MC:L/MI:L","baseRiskLevel": "CRITICAL","baseRiskScore": 10.0,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C","exposure": "NOT_DETECTED","dataAssets": "NOT_DETECTED","publicExploit": "AVAILABLE","vulnerableFunctionUsage": "IN_USE"},"cveIds": ["CVE-2017-5638"]},{"securityProblemId": "13912219969549620585","displayId": "S-3315","status": "OPEN","muted": false,"externalVulnerabilityId": "SNYK-JAVA-COMGOOGLEPROTOBUF-173761","vulnerabilityType": "THIRD_PARTY","title": "Integer Overflow","packageName": "com.google.protobuf:protobuf-java","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/13912219969549620585","technology": "JAVA","firstSeenTimestamp": 1629276761566,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "HIGH","riskScore": 8.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseRiskLevel": "HIGH","baseRiskScore": 8.8,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","exposure": "PUBLIC_NETWORK","dataAssets": "REACHABLE","publicExploit": "NOT_AVAILABLE","vulnerableFunctionUsage": "NOT_AVAILABLE"},"cveIds": ["CVE-2015-5237"]},{"securityProblemId": "1340823583484240022","displayId": "S-3630","status": "OPEN","muted": true,"externalVulnerabilityId": "SNYK-JAVA-ORGSPRINGFRAMEWORK-2436751","vulnerabilityType": "THIRD_PARTY","title": "Remote Code Execution","packageName": "org.springframework:spring-beans","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/1340823583484240022","technology": "JAVA","firstSeenTimestamp": 1648683464474,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "HIGH","riskScore": 8.8,"riskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/MAV:A","baseRiskLevel": "CRITICAL","baseRiskScore": 9.8,"baseRiskVector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F","exposure": "NOT_DETECTED","dataAssets": "REACHABLE","publicExploit": "AVAILABLE","vulnerableFunctionUsage": "IN_USE"},"cveIds": ["CVE-2022-22965"]},{"securityProblemId": "7678393544709366930","displayId": "S-3252","status": "OPEN","muted": false,"externalVulnerabilityId": "SNYK-JAVA-ORGSPRINGFRAMEWORK-1009832","vulnerabilityType": "THIRD_PARTY","title": "Improper Input Validation","packageName": "org.springframework:spring-web","url": "https://mySampleEnv.live.dynatrace.com/ui/security/problem/7678393544709366930","technology": "JAVA","firstSeenTimestamp": 1629277776755,"lastUpdatedTimestamp": 1651497109253,"riskAssessment": {"riskLevel": "HIGH","riskScore": 8.6,"riskVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","baseRiskLevel": "HIGH","baseRiskScore": 8.6,"baseRiskVector": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","exposure": "NOT_DETECTED","dataAssets": "REACHABLE","publicExploit": "NOT_AVAILABLE","vulnerableFunctionUsage": "NOT_IN_USE"},"cveIds": ["CVE-2020-5421"]}]}