Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 15, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 15, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 15, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 15, 2025

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025

      Microsoft plans to lay off 3% of its workforce, reportedly targeting management cuts as it changes to fit a “dynamic marketplace”

      May 15, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      A cross-platform Markdown note-taking application

      May 15, 2025
      Recent

      A cross-platform Markdown note-taking application

      May 15, 2025

      AI Assistant Demo & Tips for Enterprise Projects

      May 15, 2025

      Celebrating Global Accessibility Awareness Day (GAAD)

      May 15, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025
      Recent

      Intel’s latest Arc graphics driver is ready for DOOM: The Dark Ages, launching for Premium Edition owners on PC today

      May 15, 2025

      NVIDIA’s drivers are causing big problems for DOOM: The Dark Ages, but some fixes are available

      May 15, 2025

      Capcom breaks all-time profit records with 10% income growth after Monster Hunter Wilds sold over 10 million copies in a month

      May 15, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»EU Vulnerability Database Officially Launches Amid CVE Program Concerns

    EU Vulnerability Database Officially Launches Amid CVE Program Concerns

    May 13, 2025

    EUVD vulnerability database

    The European Union’s vulnerability database, under development since the release of the NIS2 Directive in December 2022, has officially launched.

    While the database has been in the works for some time, it launched in beta mode in mid-April amid uncertainty over the future of MITRE’s operation of the CVE Program, which received a last-minute 11-month extension that left many wondering about the long-term direction of the program.

    The European Union Vulnerability Database (EUVD) may be closer in function to the U.S. National Vulnerability Database (NVD), which enriches CVE data – and has struggled to keep up with the record pace of new vulnerabilities.

    Juhan Lepassaar, Executive Director of ENISA, the EU Agency for Cybersecurity, said of the new EUVD: “The EU is now equipped with an essential tool designed to substantially improve the management of vulnerabilities and the risks associated with it. The database ensures transparency to all users of the affected ICT products and services and will stand as an efficient source of information to find mitigation measures.”

    EUVD Will Include Exploited Vulnerabilities

    According to an ENISA statement, the EUVD will provide “aggregated, reliable, and actionable information such as mitigation measures and exploitation status on cybersecurity vulnerabilities affecting Information and Communication Technology (ICT) products and services.”

    The EUVD aims to provide “a high level of interconnection of publicly available information coming from multiple sources” such as CSIRTs, vendors, and existing databases. ENISA said the EUVD will facilitate the correlation of vulnerabilities through the open-source software Vulnerability-Lookup.

    The EUVD offers three views: for critical vulnerabilities, exploited ones, and for vulnerabilities coordinated by European CSIRTs. Information from CISA’s Known Exploited Vulnerability Catalogue will be automatically added to the EUVD, among other data sources.

    In September 2026, it will become mandatory in the EU for manufacturers to report actively exploited vulnerabilities, through the Single Reporting Platform (SRP) provided for in the Cyber Resilience Act (CRA), so SRP data will likely be added to the EUVD then.

    EU Vulnerability Database Launches Amid CVE Uncertainty

    ENISA has been in contact with MITRE to understand what the next steps may be for the CVE program. The agency told The Cyber Express that it is also working with EU Member States and the European Commission “to ensure resilience of the vulnerability systems.”

    ENISA is also one of 453 CVE Numbering Authorities (CNAs), which assign CVE IDs and add CVE Records to the catalog to help the CVE Program keep up with the massive increase in new vulnerabilities, now totaling more than 40,000 a year.

    The EUVD isn’t the only program launching in the wake of uncertainty over the future direction of the CVE Program.

    CVE Foundation Meets with CISA on CVE Program

    The CVE Foundation launched on April 16, 2025 as the MITRE contract was set to expire. The new foundation’s goal is to move the CVE Program away from a single government sponsor to a diversified nonprofit model.

    “We believe that this organization needs to exist outside of sole governmental control and is best suited under a public, nonprofit operating model, allowing global participation, funding, and transparency,” says a lengthy statement on the group’s home page.

    The group said it met with CISA representatives on April 24, and described the talks as “positive and encouraging.”

    Matt Hartman, CISA’s Acting Executive Assistant Director for Cybersecurity, said in an April 23 statement that there was never a funding issue, just “a contract administration issue that was resolved prior to a contract lapse. There has been no interruption to the CVE program and CISA is fully committed to sustaining and improving this critical cyber infrastructure.”

    The statement suggested the agency is open to discussions about the program’s organization, however. “We have historically been and remain very open to reevaluating the strategy to support the continued efficacy and value of the program,” Hartman’s statement said. “We also recognize that significant work lies ahead. CISA, in coordination with MITRE and the CVE Board, is committed to actively seeking and incorporating community feedback into our stewardship of the CVE Program. We are committed to fostering inclusivity, active participation, and meaningful collaboration between the private sector and international governments to deliver the requisite stability and innovation to the CVE Program. And we are committed to achieving these goals together.”

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNorth Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress
    Next Article Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

    Related Posts

    Development

    February 2025 Baseline monthly digest

    May 15, 2025
    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    May 15, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Do this first in Atomfall before freeing Dr. Garrow — you can thank me later for making it so much easier

    News & Updates

    CVE-2025-3832 – “FuseDesk WordPress Stored Cross-Site Scripting Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Who needs a console when you can play Quake 2 with AI instead

    News & Updates

    ZDNET joins CNET Group to award the Best of CES, and you can submit your entry now

    Development

    Highlights

    I bought an iPhone 16 for its AI features, but I haven’t used them even once – here’s why

    January 14, 2025

    C’mon, Apple. You’re better than this. Source: Latest news 

    Elden Ring DLC: ‘Somewhere, a great rune has broken’ meaning in Shadow of the Erdtree

    June 23, 2024

    How to Send Email with Django Using SMTP Server

    January 1, 2025

    Both of Getty’s commercial-safe AI image generators just got smarter and faster

    July 29, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.