{
  "@context": [
    "http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
  ],
  "@id": "/c/en/computer_vulnerability/n",
  "edges": [
    {
      "@id": "/a/[/r/IsA/,/c/en/access_validation_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/access_validation_vulnerability/n",
        "@type": "Node",
        "label": "access validation vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/access_validation_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/computer_vulnerability/n/,/c/en/computer/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer/n",
        "@type": "Node",
        "label": "computer",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/program_configuration_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/program_configuration_vulnerability/n",
        "@type": "Node",
        "label": "program configuration vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/program_configuration_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/locally_exploitable_computer_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/locally_exploitable_computer_vulnerability/n",
        "@type": "Node",
        "label": "locally exploitable computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/locally_exploitable_computer_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/readable_kernel_memory_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/readable_kernel_memory_vulnerability/n",
        "@type": "Node",
        "label": "readable kernel memory vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/readable_kernel_memory_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/plaintext_transmission_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/plaintext_transmission_vulnerability/n",
        "@type": "Node",
        "label": "plaintext transmission vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/plaintext_transmission_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/faulty_file_replacement_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/faulty_file_replacement_vulnerability/n",
        "@type": "Node",
        "label": "faulty file replacement vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/faulty_file_replacement_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/improper_input_validation_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/improper_input_validation_vulnerability/n",
        "@type": "Node",
        "label": "improper input validation vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/improper_input_validation_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/ExternalURL/,/c/en/computer_vulnerability/n/,/http://sw.opencyc.org/2012/05/10/concept/en/ComputerVulnerability/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "http://sw.opencyc.org/2012/05/10/concept/en/ComputerVulnerability",
        "@type": "Node",
        "label": "ComputerVulnerability",
        "path": "/2012/05/10/concept/en/ComputerVulnerability",
        "site": "sw.opencyc.org",
        "site_available": false,
        "term": "http://sw.opencyc.org/2012/05/10/concept/en/ComputerVulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/ExternalURL",
        "@type": "Relation",
        "label": "ExternalURL"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/insecure_mail_storage_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/insecure_mail_storage_vulnerability/n",
        "@type": "Node",
        "label": "insecure mail storage vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/insecure_mail_storage_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/insecure_login_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/insecure_login_vulnerability/n",
        "@type": "Node",
        "label": "insecure login vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/insecure_login_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/session_id_disclosure_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/session_id_disclosure_vulnerability/n",
        "@type": "Node",
        "label": "session id disclosure vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/session_id_disclosure_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/unauthorized_decryption_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/unauthorized_decryption_vulnerability/n",
        "@type": "Node",
        "label": "unauthorized decryption vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/unauthorized_decryption_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/bounce_attack_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/bounce_attack_vulnerability/n",
        "@type": "Node",
        "label": "bounce attack vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/bounce_attack_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/unauthorized_access_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/unauthorized_access_vulnerability/n",
        "@type": "Node",
        "label": "unauthorized access vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/unauthorized_access_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/remotely_exploitable_computer_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/remotely_exploitable_computer_vulnerability/n",
        "@type": "Node",
        "label": "remotely exploitable computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/remotely_exploitable_computer_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/security_software_bypass_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/security_software_bypass_vulnerability/n",
        "@type": "Node",
        "label": "security software bypass vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/security_software_bypass_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/no_activity_logging_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/no_activity_logging_vulnerability/n",
        "@type": "Node",
        "label": "no activity logging vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/no_activity_logging_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/symlink_attack_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/symlink_attack_vulnerability/n",
        "@type": "Node",
        "label": "symlink attack vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/symlink_attack_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    },
    {
      "@id": "/a/[/r/IsA/,/c/en/predictable_cookie_ids_vulnerability/n/,/c/en/computer_vulnerability/n/]",
      "@type": "Edge",
      "dataset": "/d/opencyc",
      "end": {
        "@id": "/c/en/computer_vulnerability/n",
        "@type": "Node",
        "label": "computer vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/computer_vulnerability"
      },
      "license": "cc:by/4.0",
      "rel": {
        "@id": "/r/IsA",
        "@type": "Relation",
        "label": "IsA"
      },
      "sources": [
        {
          "@id": "/s/resource/opencyc/2012",
          "@type": "Source",
          "contributor": "/s/resource/opencyc/2012"
        }
      ],
      "start": {
        "@id": "/c/en/predictable_cookie_ids_vulnerability/n",
        "@type": "Node",
        "label": "predictable cookie ids vulnerability",
        "language": "en",
        "sense_label": "n",
        "term": "/c/en/predictable_cookie_ids_vulnerability"
      },
      "surfaceText": null,
      "weight": 1.0
    }
  ],
  "version": "5.8.1",
  "view": {
    "@id": "/c/en/computer_vulnerability/n?offset=0&limit=20",
    "@type": "PartialCollectionView",
    "comment": "There are more results. Follow the 'nextPage' link for more.",
    "firstPage": "/c/en/computer_vulnerability/n?offset=0&limit=20",
    "nextPage": "/c/en/computer_vulnerability/n?offset=20&limit=20",
    "paginatedProperty": "edges"
  }
}