{
"@context": [
"http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
],
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"edges": [
{
"@id": "/a/[/r/IsA/,/c/en/weak_password_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/weak_password_vulnerability/n",
"@type": "Node",
"label": "weak password vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/weak_password_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_false_ip_address_login/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_false_ip_address_login",
"@type": "Node",
"label": "login screen bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/login_screen_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_because_of_weak_password_reset/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_because_of_weak_password_reset",
"@type": "Node",
"label": "weak password reset vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/weak_password_reset_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/authentication_software_bypass_vulnerability/n/,/c/en/insecure_login_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/insecure_login_vulnerability/n",
"@type": "Node",
"label": "insecure login vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/insecure_login_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/mail_server_spoofing_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/mail_server_spoofing_vulnerability/n",
"@type": "Node",
"label": "mail server spoofing vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/mail_server_spoofing_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing",
"@type": "Node",
"label": "certificate spoofing vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/certificate_spoofing_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/passwordless_root_login_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/passwordless_root_login_vulnerability/n",
"@type": "Node",
"label": "passwordless root login vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/passwordless_root_login_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/proxy_spoofing_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/proxy_spoofing_vulnerability/n",
"@type": "Node",
"label": "proxy spoofing vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/proxy_spoofing_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/passwordless_remote_login_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/passwordless_remote_login_vulnerability/n",
"@type": "Node",
"label": "passwordless remote login vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/passwordless_remote_login_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/authentication_software_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/passwordless_login_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/passwordless_login_vulnerability/n",
"@type": "Node",
"label": "passwordless login vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/passwordless_login_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/vulnerable_because_proxy_disabled/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/vulnerable_because_proxy_disabled/n",
"@type": "Node",
"label": "vulnerable because proxy disabled",
"language": "en",
"sense_label": "n",
"term": "/c/en/vulnerable_because_proxy_disabled"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_login_screen_bypass/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_login_screen_bypass",
"@type": "Node",
"label": "login screen bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/login_screen_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/weak_password_encryption_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/weak_password_encryption_vulnerability/n",
"@type": "Node",
"label": "weak password encryption vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/weak_password_encryption_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_unauthorized_password_modification/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_unauthorized_password_modification",
"@type": "Node",
"label": "unauthorized password modification vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/unauthorized_password_modification_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/password_policy_bypass_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/password_policy_bypass_vulnerability/n",
"@type": "Node",
"label": "password policy bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/password_policy_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing",
"@type": "Node",
"label": "certificate spoofing vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/certificate_spoofing_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_cookies_falsification/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_cookies_falsification",
"@type": "Node",
"label": "unauthorized password modification vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/unauthorized_password_modification_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_to_proxy_role_elevated_access/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_to_proxy_role_elevated_access",
"@type": "Node",
"label": "weak password reset vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/weak_password_reset_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/comment_spoofing_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/comment_spoofing_vulnerability/n",
"@type": "Node",
"label": "comment spoofing vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/comment_spoofing_vulnerability"
},
"surfaceText": null,
"weight": 1.0
}
],
"version": "5.8.1",
"view": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n?offset=0&limit=20",
"@type": "PartialCollectionView",
"comment": "",
"firstPage": "/c/en/authentication_software_bypass_vulnerability/n?offset=0&limit=20",
"nextPage": "/c/en/authentication_software_bypass_vulnerability/n?offset=20&limit=20",
"paginatedProperty": "edges"
}
}