{
"@context": [
"http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
],
"@id": "/c/en/computer_vulnerability/n",
"edges": [
{
"@id": "/a/[/r/IsA/,/c/en/access_validation_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/access_validation_vulnerability/n",
"@type": "Node",
"label": "access validation vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/access_validation_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/computer_vulnerability/n/,/c/en/computer/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer/n",
"@type": "Node",
"label": "computer",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/program_configuration_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/program_configuration_vulnerability/n",
"@type": "Node",
"label": "program configuration vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/program_configuration_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/locally_exploitable_computer_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/locally_exploitable_computer_vulnerability/n",
"@type": "Node",
"label": "locally exploitable computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/locally_exploitable_computer_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/readable_kernel_memory_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/readable_kernel_memory_vulnerability/n",
"@type": "Node",
"label": "readable kernel memory vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/readable_kernel_memory_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/plaintext_transmission_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/plaintext_transmission_vulnerability/n",
"@type": "Node",
"label": "plaintext transmission vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/plaintext_transmission_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/faulty_file_replacement_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/faulty_file_replacement_vulnerability/n",
"@type": "Node",
"label": "faulty file replacement vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/faulty_file_replacement_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/improper_input_validation_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/improper_input_validation_vulnerability/n",
"@type": "Node",
"label": "improper input validation vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/improper_input_validation_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/ExternalURL/,/c/en/computer_vulnerability/n/,/http://sw.opencyc.org/2012/05/10/concept/en/ComputerVulnerability/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "http://sw.opencyc.org/2012/05/10/concept/en/ComputerVulnerability",
"@type": "Node",
"label": "ComputerVulnerability",
"path": "/2012/05/10/concept/en/ComputerVulnerability",
"site": "sw.opencyc.org",
"site_available": false,
"term": "http://sw.opencyc.org/2012/05/10/concept/en/ComputerVulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/ExternalURL",
"@type": "Relation",
"label": "ExternalURL"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/insecure_mail_storage_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/insecure_mail_storage_vulnerability/n",
"@type": "Node",
"label": "insecure mail storage vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/insecure_mail_storage_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/insecure_login_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/insecure_login_vulnerability/n",
"@type": "Node",
"label": "insecure login vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/insecure_login_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/session_id_disclosure_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/session_id_disclosure_vulnerability/n",
"@type": "Node",
"label": "session id disclosure vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/session_id_disclosure_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/unauthorized_decryption_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/unauthorized_decryption_vulnerability/n",
"@type": "Node",
"label": "unauthorized decryption vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/unauthorized_decryption_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/bounce_attack_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/bounce_attack_vulnerability/n",
"@type": "Node",
"label": "bounce attack vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/bounce_attack_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/unauthorized_access_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/unauthorized_access_vulnerability/n",
"@type": "Node",
"label": "unauthorized access vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/unauthorized_access_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/remotely_exploitable_computer_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/remotely_exploitable_computer_vulnerability/n",
"@type": "Node",
"label": "remotely exploitable computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/remotely_exploitable_computer_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/security_software_bypass_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/no_activity_logging_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/no_activity_logging_vulnerability/n",
"@type": "Node",
"label": "no activity logging vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/no_activity_logging_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/symlink_attack_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/symlink_attack_vulnerability/n",
"@type": "Node",
"label": "symlink attack vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/symlink_attack_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/predictable_cookie_ids_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/predictable_cookie_ids_vulnerability/n",
"@type": "Node",
"label": "predictable cookie ids vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/predictable_cookie_ids_vulnerability"
},
"surfaceText": null,
"weight": 1.0
}
],
"version": "5.8.1",
"view": {
"@id": "/c/en/computer_vulnerability/n?offset=0&limit=20",
"@type": "PartialCollectionView",
"comment": "",
"firstPage": "/c/en/computer_vulnerability/n?offset=0&limit=20",
"nextPage": "/c/en/computer_vulnerability/n?offset=20&limit=20",
"paginatedProperty": "edges"
}
}