en authentication software bypass vulnerability (n)

An English term in ConceptNet 5.8

Source: OpenCyc 2012
View this term in the API
  • Documentation
  • FAQ
  • Chat
  • Blog
  • Documentation
  • FAQ
  • Chat
  • Blog

Types of authentication software bypass vulnerability

  • en certificate spoofing vulnerability (n) ➜
  • en certificate spoofing vulnerability (n) ➜
  • en comment spoofing vulnerability (n) ➜
  • en login screen bypass vulnerability (n) ➜
  • en login screen bypass vulnerability (n) ➜
  • en mail server spoofing vulnerability (n) ➜
  • en password policy bypass vulnerability (n) ➜
  • en passwordless login vulnerability (n) ➜
  • en passwordless remote login vulnerability (n) ➜
  • en passwordless root login vulnerability (n) ➜
  • en proxy spoofing vulnerability (n) ➜
  • en unauthorized password modification vulnerability (n) ➜
  • en unauthorized password modification vulnerability (n) ➜
  • en unauthorized password reset vulnerability (n) ➜
  • en vulnerable because proxy disabled (n) ➜
  • en weak password encryption vulnerability (n) ➜
  • en weak password reset vulnerability (n) ➜
  • en weak password reset vulnerability (n) ➜
  • en weak password vulnerability (n) ➜

authentication software bypass vulnerability is a type of…

  • en insecure login vulnerability (n) ➜
  • en security software bypass vulnerability (n) ➜

Links to other resources

  • sw.opencyc.org /2012/05/10/concept/en/VulnerableToAuthenticationSoftwareBypass
Creative Commons License
ConceptNet 5 is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. If you use it in research, please cite this AAAI paper.
See Copying and Sharing ConceptNet for more details.