{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-28929","assignerOrgId":"7f7bd7df-cffe-4fdb-ab6d-859363b89272","state":"PUBLISHED","assignerShortName":"trendmicro","dateReserved":"2023-03-27T22:16:25.202Z","datePublished":"2023-06-26T21:52:22.423Z","dateUpdated":"2024-12-05T15:46:07.827Z"},"containers":{"cna":{"affected":[{"vendor":"Trend Micro, Inc.","product":"Trend Micro Security (Consumer)","versions":[{"version":"2023","status":"affected","versionType":"semver","lessThan":"17.7.1634"}]}],"descriptions":[{"lang":"en","value":"Trend Micro Security 2021, 2022, and 2023 (Consumer) are vulnerable to a DLL Hijacking vulnerability which could allow an attacker to use a specific executable file as an execution and/or persistence mechanism which could execute a malicious program each time the executable file is started."}],"providerMetadata":{"orgId":"7f7bd7df-cffe-4fdb-ab6d-859363b89272","shortName":"trendmicro","dateUpdated":"2023-06-26T21:52:22.423Z"},"references":[{"url":"https://helpcenter.trendmicro.com/en-us/article/tmka-19062"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T13:51:38.989Z"},"title":"CVE Program Container","references":[{"url":"https://helpcenter.trendmicro.com/en-us/article/tmka-19062","tags":["x_transferred"]}]},{"affected":[{"vendor":"trend_micro_inc","product":"trend_micro_security","cpes":["cpe:2.3:a:trend_micro_inc:trend_micro_security:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"2023","status":"affected","lessThan":"17.7.1634","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-05T15:42:15.626436Z","id":"CVE-2023-28929","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-05T15:46:07.827Z"}}]}}