{
"@context": [
"http://api.conceptnet.io/ld/conceptnet5.7/context.ld.json"
],
"@id": "/c/en/security_software_bypass_vulnerability",
"edges": [
{
"@id": "/a/[/r/IsA/,/c/en/virus_scan_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/virus_scan_bypass_vulnerability/n",
"@type": "Node",
"label": "virus scan bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/virus_scan_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/activity_log_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/activity_log_bypass_vulnerability/n",
"@type": "Node",
"label": "activity log bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/activity_log_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/ip_masquerading_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/ip_masquerading_bypass_vulnerability/n",
"@type": "Node",
"label": "ip masquerading bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/ip_masquerading_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/kerberos_kdc_spoofing_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/kerberos_kdc_spoofing_vulnerability/n",
"@type": "Node",
"label": "kerberos kdc spoofing vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/kerberos_kdc_spoofing_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/digital_signature_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/digital_signature_bypass_vulnerability/n",
"@type": "Node",
"label": "digital signature bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/digital_signature_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/command_filtering_bypass_vulnerability/n/opencyc/vulnerable_to_command_filtering_bypass/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/command_filtering_bypass_vulnerability/n/opencyc/vulnerable_to_command_filtering_bypass",
"@type": "Node",
"label": "command filtering bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/command_filtering_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/user_restriction_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/user_restriction_bypass_vulnerability/n",
"@type": "Node",
"label": "user restriction bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/user_restriction_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/authentication_software_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/authentication_software_bypass_vulnerability/n",
"@type": "Node",
"label": "authentication software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/authentication_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/ExternalURL/,/c/en/security_software_bypass_vulnerability/n/,/http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToSecuritySoftwareBypass/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToSecuritySoftwareBypass",
"@type": "Node",
"label": "VulnerableToSecuritySoftwareBypass",
"path": "/2012/05/10/concept/en/VulnerableToSecuritySoftwareBypass",
"site": "sw.opencyc.org",
"site_available": false,
"term": "http://sw.opencyc.org/2012/05/10/concept/en/VulnerableToSecuritySoftwareBypass"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/ExternalURL",
"@type": "Relation",
"label": "ExternalURL"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/obfuscating_file_source_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/obfuscating_file_source_vulnerability/n",
"@type": "Node",
"label": "obfuscating file source vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/obfuscating_file_source_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/stack_protection_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/stack_protection_bypass_vulnerability/n",
"@type": "Node",
"label": "stack protection bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/stack_protection_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/filtering_software_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/filtering_software_bypass_vulnerability/n",
"@type": "Node",
"label": "filtering software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/filtering_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/security_software_bypass_vulnerability/n/,/c/en/computer_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/computer_vulnerability/n",
"@type": "Node",
"label": "computer vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/computer_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/command_filtering_bypass_vulnerability/n/opencyc/vulnerable_because_of_command_filtering_bypass/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/command_filtering_bypass_vulnerability/n/opencyc/vulnerable_because_of_command_filtering_bypass",
"@type": "Node",
"label": "command filtering bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/command_filtering_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/buffer_overflow_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/buffer_overflow_bypass_vulnerability/n",
"@type": "Node",
"label": "buffer overflow bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/buffer_overflow_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/spoofable_file_extensions_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/spoofable_file_extensions_vulnerability/n",
"@type": "Node",
"label": "spoofable file extensions vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/spoofable_file_extensions_vulnerability"
},
"surfaceText": null,
"weight": 1.0
},
{
"@id": "/a/[/r/IsA/,/c/en/cache_bypass_vulnerability/n/,/c/en/security_software_bypass_vulnerability/n/]",
"@type": "Edge",
"dataset": "/d/opencyc",
"end": {
"@id": "/c/en/security_software_bypass_vulnerability/n",
"@type": "Node",
"label": "security software bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/security_software_bypass_vulnerability"
},
"license": "cc:by/4.0",
"rel": {
"@id": "/r/IsA",
"@type": "Relation",
"label": "IsA"
},
"sources": [
{
"@id": "/s/resource/opencyc/2012",
"@type": "Source",
"contributor": "/s/resource/opencyc/2012"
}
],
"start": {
"@id": "/c/en/cache_bypass_vulnerability/n",
"@type": "Node",
"label": "cache bypass vulnerability",
"language": "en",
"sense_label": "n",
"term": "/c/en/cache_bypass_vulnerability"
},
"surfaceText": null,
"weight": 1.0
}
],
"version": "5.8.1"
}