...
Once there is intelligence received regarding a CVE that is actively being used and exploited in the wild, this CVE will enter can be entered into the Prism Active Exploit Detection Service. In turn, Prism will then correlate this actively exploited CVE with your vulnerability data held in Prism, and alert you of the fact.
This provides our clients with further remediation and risk prioritisation capabilities.
Users are able to add the following information:
CVE Number - Required field
Name - of the vulnerability or issue
Description - Brief description of the issue
Origin - Where the issue intelligence originates from
Expiry - Ability to select the expiry of the watchlist item, default 28 days or a custom date in the future
...