This page refers to the classic
Third-Party Vulnerabilities and
Code-Level Vulnerabilities apps, which are deprecated. If you're currently using these apps, we recommend transitioning to the unified
Vulnerabilities in the latest Dynatrace experience, which offers enhanced functionality and ongoing support. For details, see Upgrade to the latest Dynatrace.
The following Application Security metrics are available for Runtime Vulnerability Analytics.
Risk level (Critical, High, Medium, Low, None)
Type (Third-party vulnerability, Code-level vulnerability)
Management zone name – only for split-by-zone metrics
Vulnerable component type (Library, Runtime) – only available for third-party vulnerabilities
Public internet exposure (Public internet exposure, No public internet exposure, Public internet exposure not available)
Reachable data assets (Reachable data assets, No reachable data assets, Reachable data assets not available)
Vulnerable functions (Vulnerable functions in use, No vulnerable functions in use, Vulnerable functions not available)
Assessment accuracy (Full accuracy, Reduced accuracy, Accuracy not available)
Public exploit (Public exploit published, No public exploit published)
Not available)Not available)CRITICAL, HIGH, MEDIUM, LOW, NONE)Java, .NET, Node.js, PHP, GO)Third-party vulnerability, Code-level vulnerability)To view Application Security metrics
Go to Metrics.
Filter for the category of metrics you want, for example affected process groups.
Tag, Unit, Favorites). See Filter and sort the table for details.Expand Details for any metric to see metric details and a chart of the metric over the selected timeframe. For more information, see Metrics browser.
Example metric details:

You can use Application Security metrics to
To view the current status of affected entities in your environment and see how the process of remediating vulnerabilities is developing, create a chart for the Vulnerabilities - affected entities count metric and pin it to your dashboard.
Once you run a query in Data Explorer, you can
Third-Party Vulnerabilities
Code-Level VulnerabilitiesApplication Security