Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      10 Benefits of Hiring a React.js Development Company (2025–2026 Edition)

      August 13, 2025

      From Line To Layout: How Past Experiences Shape Your Design Career

      August 13, 2025

      Hire React.js Developers in the US: How to Choose the Right Team for Your Needs

      August 13, 2025

      Google’s coding agent Jules gets critique functionality

      August 13, 2025

      The best smartphones without AI features in 2025: Expert tested and recommended

      August 13, 2025

      GPT-5 was supposed to simplify ChatGPT but now it has 4 new modes – here’s why

      August 13, 2025

      Gemini just got two of ChatGPT’s best features – and they’re free

      August 13, 2025

      The HP OmniBook 5 laptop offers 34 hours of battery life – and it’s 60% off today only

      August 13, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel Boost is released

      August 13, 2025
      Recent

      Laravel Boost is released

      August 13, 2025

      Frontend Standards for Optimizely Configured Commerce: Clean & Scalable Web Best Practices

      August 13, 2025

      Live Agent Escalation in Copilot Studio Using D365 Omnichannel – Architecture and Use Case

      August 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      OpenAI’s Sam Altman: GPT-5 fails to meet AGI standards amid Microsoft’s fading partnership — “it’s still missing something”

      August 13, 2025
      Recent

      OpenAI’s Sam Altman: GPT-5 fails to meet AGI standards amid Microsoft’s fading partnership — “it’s still missing something”

      August 13, 2025

      You Think You Need a Monster PC to Run Local AI, Don’t You? — My Seven-Year-Old Mid-range Laptop Says Otherwise

      August 13, 2025

      8 Registry Tweaks that will Make File Explorer Faster and Easier to Use on Windows 11

      August 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»EU Vulnerability Database Officially Launches Amid CVE Program Concerns

    EU Vulnerability Database Officially Launches Amid CVE Program Concerns

    May 13, 2025

    EUVD vulnerability database

    The European Union’s vulnerability database, under development since the release of the NIS2 Directive in December 2022, has officially launched.

    While the database has been in the works for some time, it launched in beta mode in mid-April amid uncertainty over the future of MITRE’s operation of the CVE Program, which received a last-minute 11-month extension that left many wondering about the long-term direction of the program.

    The European Union Vulnerability Database (EUVD) may be closer in function to the U.S. National Vulnerability Database (NVD), which enriches CVE data – and has struggled to keep up with the record pace of new vulnerabilities.

    Juhan Lepassaar, Executive Director of ENISA, the EU Agency for Cybersecurity, said of the new EUVD: “The EU is now equipped with an essential tool designed to substantially improve the management of vulnerabilities and the risks associated with it. The database ensures transparency to all users of the affected ICT products and services and will stand as an efficient source of information to find mitigation measures.”

    EUVD Will Include Exploited Vulnerabilities

    According to an ENISA statement, the EUVD will provide “aggregated, reliable, and actionable information such as mitigation measures and exploitation status on cybersecurity vulnerabilities affecting Information and Communication Technology (ICT) products and services.”

    The EUVD aims to provide “a high level of interconnection of publicly available information coming from multiple sources” such as CSIRTs, vendors, and existing databases. ENISA said the EUVD will facilitate the correlation of vulnerabilities through the open-source software Vulnerability-Lookup.

    The EUVD offers three views: for critical vulnerabilities, exploited ones, and for vulnerabilities coordinated by European CSIRTs. Information from CISA’s Known Exploited Vulnerability Catalogue will be automatically added to the EUVD, among other data sources.

    In September 2026, it will become mandatory in the EU for manufacturers to report actively exploited vulnerabilities, through the Single Reporting Platform (SRP) provided for in the Cyber Resilience Act (CRA), so SRP data will likely be added to the EUVD then.

    EU Vulnerability Database Launches Amid CVE Uncertainty

    ENISA has been in contact with MITRE to understand what the next steps may be for the CVE program. The agency told The Cyber Express that it is also working with EU Member States and the European Commission “to ensure resilience of the vulnerability systems.”

    ENISA is also one of 453 CVE Numbering Authorities (CNAs), which assign CVE IDs and add CVE Records to the catalog to help the CVE Program keep up with the massive increase in new vulnerabilities, now totaling more than 40,000 a year.

    The EUVD isn’t the only program launching in the wake of uncertainty over the future direction of the CVE Program.

    CVE Foundation Meets with CISA on CVE Program

    The CVE Foundation launched on April 16, 2025 as the MITRE contract was set to expire. The new foundation’s goal is to move the CVE Program away from a single government sponsor to a diversified nonprofit model.

    “We believe that this organization needs to exist outside of sole governmental control and is best suited under a public, nonprofit operating model, allowing global participation, funding, and transparency,” says a lengthy statement on the group’s home page.

    The group said it met with CISA representatives on April 24, and described the talks as “positive and encouraging.”

    Matt Hartman, CISA’s Acting Executive Assistant Director for Cybersecurity, said in an April 23 statement that there was never a funding issue, just “a contract administration issue that was resolved prior to a contract lapse. There has been no interruption to the CVE program and CISA is fully committed to sustaining and improving this critical cyber infrastructure.”

    The statement suggested the agency is open to discussions about the program’s organization, however. “We have historically been and remain very open to reevaluating the strategy to support the continued efficacy and value of the program,” Hartman’s statement said. “We also recognize that significant work lies ahead. CISA, in coordination with MITRE and the CVE Board, is committed to actively seeking and incorporating community feedback into our stewardship of the CVE Program. We are committed to fostering inclusivity, active participation, and meaningful collaboration between the private sector and international governments to deliver the requisite stability and innovation to the CVE Program. And we are committed to achieving these goals together.”

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNorth Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
    Next Article Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

    Related Posts

    Development

    Laravel Boost is released

    August 13, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    August 13, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    The Future of AngularJS: What to Expect in the Next Few Years

    Web Development

    CVE-2025-5643 – “Radare2 Local Memory Corruption Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Resources for Web Designers and Developers (March 2025

    Web Development

    CVE-2025-44861 – TOTOLINK CA300-POE Command Injection

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)

    April 25, 2025

    Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)

    Researchers have uncovered three serious vulnerabilities in Rack, a server interface used by most Ruby web app frameworks (Ruby on Rails, Sinatra, Hanami, Roda, and others).
    Two of the flaws – CVE-202 …
    Read more

    Published Date:
    Apr 25, 2025 (2 hours, 26 minutes ago)

    Vulnerabilities has been mentioned in this article.

    CVE-2025-34028

    CVE-2025-27610

    CVE-2025-27111

    CVE-2025-25184

    Fix Coming for Window Button Bug in Ubuntu 25.04

    April 23, 2025

    I wish I’d found this Atomfall weapon sooner, it shreds EVERYTHING — trust me, you need to get it

    April 1, 2025

    CVE-2025-4326 – MRCMS Cross-Site Scripting Vulnerability

    May 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.