{
  "@context": [
    "http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
  ],
  "@id": "/c/en/authentication_software_bypass_vulnerability/n",
  "edges": [
    {
      "@id": "/a/[/r/IsA/,/c/en/weak_password_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/weak_password_vulnerability/n",
        "@type": "Node",
        "label": "weak password vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/weak_password_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_false_ip_address_login/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_false_ip_address_login",
        "@type": "Node",
        "label": "login screen bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/login_screen_bypass_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_because_of_weak_password_reset/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_because_of_weak_password_reset",
        "@type": "Node",
        "label": "weak password reset vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/weak_password_reset_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/authentication_software_bypass_vulnerability/n/,/c/en/insecure_login_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/insecure_login_vulnerability/n",
        "@type": "Node",
        "label": "insecure login vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/insecure_login_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/mail_server_spoofing_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/mail_server_spoofing_vulnerability/n",
        "@type": "Node",
        "label": "mail server spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/mail_server_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing",
        "@type": "Node",
        "label": "certificate spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/certificate_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/passwordless_root_login_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/passwordless_root_login_vulnerability/n",
        "@type": "Node",
        "label": "passwordless root login vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/passwordless_root_login_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/proxy_spoofing_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/proxy_spoofing_vulnerability/n",
        "@type": "Node",
        "label": "proxy spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/proxy_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/passwordless_remote_login_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/passwordless_remote_login_vulnerability/n",
        "@type": "Node",
        "label": "passwordless remote login vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/passwordless_remote_login_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/authentication_software_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/security_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "security software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/security_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/passwordless_login_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/passwordless_login_vulnerability/n",
        "@type": "Node",
        "label": "passwordless login vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/passwordless_login_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/vulnerable_because_proxy_disabled/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/vulnerable_because_proxy_disabled/n",
        "@type": "Node",
        "label": "vulnerable because proxy disabled",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/vulnerable_because_proxy_disabled"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_login_screen_bypass/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/login_screen_bypass_vulnerability/n/opencyc/vulnerable_to_login_screen_bypass",
        "@type": "Node",
        "label": "login screen bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/login_screen_bypass_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/weak_password_encryption_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/weak_password_encryption_vulnerability/n",
        "@type": "Node",
        "label": "weak password encryption vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/weak_password_encryption_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_unauthorized_password_modification/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_unauthorized_password_modification",
        "@type": "Node",
        "label": "unauthorized password modification vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/unauthorized_password_modification_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/password_policy_bypass_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/password_policy_bypass_vulnerability/n",
        "@type": "Node",
        "label": "password policy bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/password_policy_bypass_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing",
        "@type": "Node",
        "label": "certificate spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/certificate_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_cookies_falsification/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/unauthorized_password_modification_vulnerability/n/opencyc/vulnerable_to_cookies_falsification",
        "@type": "Node",
        "label": "unauthorized password modification vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/unauthorized_password_modification_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_to_proxy_role_elevated_access/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/weak_password_reset_vulnerability/n/opencyc/vulnerable_to_proxy_role_elevated_access",
        "@type": "Node",
        "label": "weak password reset vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/weak_password_reset_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/comment_spoofing_vulnerability/n/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/comment_spoofing_vulnerability/n",
        "@type": "Node",
        "label": "comment spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/comment_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    }
  ],
  "version": "5.8.1",
  "view": {
    "@id": "/c/en/authentication_software_bypass_vulnerability/n?offset=0&limit=20",
    "@type": "PartialCollectionView",
    "comment": "There are more results. Follow the 'nextPage' link for more.",
    "firstPage": "/c/en/authentication_software_bypass_vulnerability/n?offset=0&limit=20",
    "nextPage": "/c/en/authentication_software_bypass_vulnerability/n?offset=20&limit=20",
    "paginatedProperty": "edges"
  }
}