runtime -> Prioritizing Vulnerabilities Using Runtime Dashboard -> Step 2: Investigate Specific CVEs in the Vulnerability Table
external_document
Products
JFrog Runtime
Content Type
User Guide