"write-what-where" meaning in English

See write-what-where in All languages combined, or Wiktionary

Adjective

Head templates: {{en-adj|-}} write-what-where (not comparable)
  1. (computer security) Being or relating to a security vulnerability allowing the attacker to write arbitrary data to an arbitrary location. Tags: not-comparable Categories (topical): Computer security
    Sense id: en-write-what-where-en-adj-UQjHrTvE Categories (other): English entries with incorrect language header

Download JSON data for write-what-where meaning in English (1.9kB)

{
  "head_templates": [
    {
      "args": {
        "1": "-"
      },
      "expansion": "write-what-where (not comparable)",
      "name": "en-adj"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "adj",
  "senses": [
    {
      "categories": [
        {
          "kind": "other",
          "name": "English entries with incorrect language header",
          "parents": [
            "Entries with incorrect language header",
            "Entry maintenance"
          ],
          "source": "w"
        },
        {
          "kind": "topical",
          "langcode": "en",
          "name": "Computer security",
          "orig": "en:Computer security",
          "parents": [
            "Computing",
            "Technology",
            "All topics",
            "Fundamental"
          ],
          "source": "w"
        }
      ],
      "examples": [
        {
          "ref": "2010, Enrico Perla, Massimiliano Oldani, A Guide to Kernel Exploitation: Attacking the Core, page 308",
          "text": "Arbitrary memory overwrite, also known as the \"write-what-where\" vulnerability, is the most common vulnerability affecting Windows kernel drivers. This kind of vulnerability is mainly due to failure or incorrect use of the user-land validation kernel APIs.",
          "type": "quotation"
        },
        {
          "ref": "2021, Arti Noor, Abhijit Sen, Gaurav Trivedi, Proceedings of Emerging Trends and Technologies on Intelligent Systems: ETTIS 2021, page 26",
          "text": "A write-what-where primitive allows the attacker to write arbitrary data wherever they want in the memory",
          "type": "quotation"
        }
      ],
      "glosses": [
        "Being or relating to a security vulnerability allowing the attacker to write arbitrary data to an arbitrary location."
      ],
      "id": "en-write-what-where-en-adj-UQjHrTvE",
      "links": [
        [
          "computer security",
          "computer security"
        ],
        [
          "security",
          "security"
        ],
        [
          "vulnerability",
          "vulnerability"
        ],
        [
          "attacker",
          "attacker"
        ],
        [
          "write",
          "write"
        ],
        [
          "arbitrary",
          "arbitrary"
        ],
        [
          "data",
          "data"
        ],
        [
          "location",
          "location"
        ]
      ],
      "qualifier": "computer security",
      "raw_glosses": [
        "(computer security) Being or relating to a security vulnerability allowing the attacker to write arbitrary data to an arbitrary location."
      ],
      "tags": [
        "not-comparable"
      ]
    }
  ],
  "word": "write-what-where"
}
{
  "head_templates": [
    {
      "args": {
        "1": "-"
      },
      "expansion": "write-what-where (not comparable)",
      "name": "en-adj"
    }
  ],
  "lang": "English",
  "lang_code": "en",
  "pos": "adj",
  "senses": [
    {
      "categories": [
        "English adjectives",
        "English entries with incorrect language header",
        "English lemmas",
        "English multiword terms",
        "English terms with quotations",
        "English uncomparable adjectives",
        "en:Computer security"
      ],
      "examples": [
        {
          "ref": "2010, Enrico Perla, Massimiliano Oldani, A Guide to Kernel Exploitation: Attacking the Core, page 308",
          "text": "Arbitrary memory overwrite, also known as the \"write-what-where\" vulnerability, is the most common vulnerability affecting Windows kernel drivers. This kind of vulnerability is mainly due to failure or incorrect use of the user-land validation kernel APIs.",
          "type": "quotation"
        },
        {
          "ref": "2021, Arti Noor, Abhijit Sen, Gaurav Trivedi, Proceedings of Emerging Trends and Technologies on Intelligent Systems: ETTIS 2021, page 26",
          "text": "A write-what-where primitive allows the attacker to write arbitrary data wherever they want in the memory",
          "type": "quotation"
        }
      ],
      "glosses": [
        "Being or relating to a security vulnerability allowing the attacker to write arbitrary data to an arbitrary location."
      ],
      "links": [
        [
          "computer security",
          "computer security"
        ],
        [
          "security",
          "security"
        ],
        [
          "vulnerability",
          "vulnerability"
        ],
        [
          "attacker",
          "attacker"
        ],
        [
          "write",
          "write"
        ],
        [
          "arbitrary",
          "arbitrary"
        ],
        [
          "data",
          "data"
        ],
        [
          "location",
          "location"
        ]
      ],
      "qualifier": "computer security",
      "raw_glosses": [
        "(computer security) Being or relating to a security vulnerability allowing the attacker to write arbitrary data to an arbitrary location."
      ],
      "tags": [
        "not-comparable"
      ]
    }
  ],
  "word": "write-what-where"
}

This page is a part of the kaikki.org machine-readable English dictionary. This dictionary is based on structured data extracted on 2024-05-06 from the enwiktionary dump dated 2024-05-02 using wiktextract (f4fd8c9 and c9440ce). The data shown on this site has been post-processed and various details (e.g., extra categories) removed, some information disambiguated, and additional data merged from other sources. See the raw data download page for the unprocessed wiktextract data.

If you use this data in academic research, please cite Tatu Ylonen: Wiktextract: Wiktionary as Machine-Readable Structured Data, Proceedings of the 13th Conference on Language Resources and Evaluation (LREC), pp. 1317-1325, Marseille, 20-25 June 2022. Linking to the relevant page(s) under https://kaikki.org would also be greatly appreciated.