## **Idea to improve the JSON format of CVEs for automation** Hi everyone, As part of a school project, I’m working on automating the testing of CVEs (PoCs, vulnerable environments, automatic reproduction, etc.). While digging into the official JSON format, I’ve noticed two major issues: ### **1. SSVC is stored in `metrics.other`** I parsed over 300,000 CVE JSON files (taken from the official repository: [https://github.com/CVEProject/cvelistV5/tree/main/cves](https://github.com/CVEProject/cvelistV5/tree/main/cves)). The `metrics.other` field is essentially a dumping ground, and SSVC doesn’t really fit the definition of a “metric.” I propose moving SSVC into its own dedicated section, which would be more logical: ```json "ssvc": { "exploitation": "poc", "automatable": true, "technicalImpact": "total" } ``` ### **2. No dedicated place for PoCs / docker-compose resources** Right now, these links end up in `references`, mixed with blog posts, advisories, and patch notes. A dedicated section would make automation much easier: ```json "automation": { "environment": { "url": "https://github.com/.../docker-compose.yml" }, "poc": { "url": "https://github.com/.../poc.py" } } ``` --- ## **What do you think?** Would this kind of restructuring make CVE data more usable in automated pipelines? Any ideas, objections, or improvements? Thanks in advance for your feedback!