{
  "@context": [
    "http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
  ],
  "@id": "/c/en/certificate_spoofing_vulnerability",
  "edges": [
    {
      "@id": "/a/[/r/IsA/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing",
        "@type": "Node",
        "label": "certificate spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/certificate_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/ExternalURL/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing/,/http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToEMailSpoofing/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToEMailSpoofing",
        "@type": "Node",
        "label": "VulnerableToEMailSpoofing",
        "path": "/2012/05/10/concept/en/VulnerableToEMailSpoofing",
        "site": "sw.opencyc.org",
        "site_available": false,
        "term": "http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToEMailSpoofing"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/ExternalURL",
        "@type": "Relation",
        "label": "ExternalURL"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing",
        "@type": "Node",
        "label": "certificate spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/certificate_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/ExternalURL/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing/,/http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToCertificateSpoofing/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToCertificateSpoofing",
        "@type": "Node",
        "label": "VulnerableToCertificateSpoofing",
        "path": "/2012/05/10/concept/en/VulnerableToCertificateSpoofing",
        "site": "sw.opencyc.org",
        "site_available": false,
        "term": "http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToCertificateSpoofing"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/ExternalURL",
        "@type": "Relation",
        "label": "ExternalURL"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_certificate_spoofing",
        "@type": "Node",
        "label": "certificate spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/certificate_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing/,/c/en/authentication_software_bypass_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/authentication_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "authentication software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/authentication_software_bypass_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/certificate_spoofing_vulnerability/n/opencyc/vulnerable_to_e_mail_spoofing",
        "@type": "Node",
        "label": "certificate spoofing vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/certificate_spoofing_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    }
  ],
  "version": "5.8.1"
}