{"id":6613,"date":"2026-01-19T14:55:19","date_gmt":"2026-01-19T14:55:19","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=6613"},"modified":"2026-01-19T14:55:19","modified_gmt":"2026-01-19T14:55:19","slug":"neue-eu-schwachstellen-datenbank-gestartet","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=6613","title":{"rendered":"Neue EU-Schwachstellen-Datenbank gestartet"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\"> srcset=&#8221;https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?quality=50&amp;strip=all 8960w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=1024%2C576&amp;quality=50&amp;strip=all 1024w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=2048%2C1152&amp;quality=50&amp;strip=all 2048w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=854%2C480&amp;quality=50&amp;strip=all 854w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=640%2C360&amp;quality=50&amp;strip=all 640w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=444%2C250&amp;quality=50&amp;strip=all 444w&#8221; width=&#8221;1024&#8243; height=&#8221;576&#8243; sizes=&#8221;auto, (max-width: 1024px) 100vw, 1024px&#8221;&gt;Die neue GCVE-Datenbank soll das Schwachstellenmanagement effizienter und einfacher machen.\n<p class=\"imageCredit\">Summit Art Creations \u2013 shutterstock.com<\/p>\n<\/div>\n<p>Mit <a href=\"https:\/\/db.gcve.eu\/\" target=\"_blank\" rel=\"noopener\">db.gcve.eu<\/a> stellt die GCVE-Initiative (Global Cybersecurity Vulnerability Enumeration) ab sofort eine kostenfreie, \u00f6ffentlich zug\u00e4ngliche Datenbank f\u00fcr IT-Sicherheitsl\u00fccken bereit. Ziel ist es, die Abh\u00e4ngigkeit von US-Datenbanken zu beenden und die digitale Souver\u00e4nit\u00e4t in <a href=\"https:\/\/www.csoonline.com\/article\/3985557\/neue-eu-schwachstellen-datenbank-geht-an-den-start.html\" target=\"_blank\" rel=\"noopener\">Europa<\/a> zu st\u00e4rken.<\/p>\n<h2 class=\"wp-block-heading\">GCVE-Datenbank soll Schwachstellenmeldung erleichtern<\/h2>\n<p>Die Plattform f\u00fchrt Informationen aus verschiedenen \u00f6ffentlichen Ressourcen zusammen. Dazu z\u00e4hlen die Quellen des GCVE Numbering Authority (GNA)-Modells. Es l\u00f6st die traditionelle, zentrale Vergabe von Schwachstellen-Kennungen (CVE IDs) ab. Zudem werden Daten von weiteren anerkannten Schwachstellenverzeichnissen genutzt.<\/p>\n<p>Der dezentrale Ansatz erm\u00f6glicht es, Schwachstellen-Kennungen autonom zu vergeben und zu ver\u00f6ffentlichen, ohne auf eine zentrale Freigabe warten zu m\u00fcssen. Insgesamt werden derzeit mehr als 25 unterschiedliche Datenquellen eingebunden. Die erfassten Schwachstellendaten werden normalisiert, strukturiert und durchsuchbar aufbereitet.<\/p>\n<p>Dar\u00fcber hinaus bietet die offene API eine nahtlose Integration in bestehende Compliance-Tools und Risikomanagement-Systeme. Sicherheitsverantwortliche, Wissenschaftler, Computer Security Incident Response Teams, Softwareanbieter und Open-Source-Entwickler sollen dadurch in die Lage versetzt werden, Sicherheitsmeldungen \u00f6kosystem\u00fcbergreifend effizienter nachzuverfolgen und auszuwerten.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>srcset=&#8221;https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?quality=50&amp;strip=all 8960w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=1024%2C576&amp;quality=50&amp;strip=all 1024w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=2048%2C1152&amp;quality=50&amp;strip=all 2048w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=854%2C480&amp;quality=50&amp;strip=all 854w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=640%2C360&amp;quality=50&amp;strip=all 640w, https:\/\/b2b-contenthub.com\/wp-content\/uploads\/2026\/01\/shutterstock_2692564999.jpg?resize=444%2C250&amp;quality=50&amp;strip=all 444w&#8221; width=&#8221;1024&#8243; height=&#8221;576&#8243; sizes=&#8221;auto, (max-width: 1024px) 100vw, 1024px&#8221;&gt;Die neue GCVE-Datenbank soll das Schwachstellenmanagement effizienter und einfacher machen. Summit Art Creations \u2013 shutterstock.com Mit db.gcve.eu stellt die GCVE-Initiative (Global Cybersecurity Vulnerability Enumeration) ab sofort eine [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":6614,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6613"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6613"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6613\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/6614"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}