runtime -> Prioritizing Vulnerabilities Using Runtime Dashboard -> Step 2: Investigate Specific CVEs in the Vulnerability Table

external_document

Products
JFrog Runtime
Content Type
User Guide