{"id":"CVE-2024-36599","details":"A cross-site scripting (XSS) vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter at insertClient.php.","modified":"2026-03-14T12:34:13.048105Z","published":"2024-06-14T18:15:27.677Z","references":[{"type":"WEB","url":"https://www.exploit-db.com/exploits/52042"},{"type":"ADVISORY","url":"https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36599"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36599.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}