CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,511
Total CVEs
263
Critical
922
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 75
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Cisco 41
8 Huawei 40
9 Color 40
10 Reolink 36

All Improper Input Validation CVEs (1,511)

CVE-2024-13943
7.8

This vulnerability in Tesla Model S vehicles allows local attackers with low-privileged code execution to escape the sandbox via improper input valida...

Apr 30, 2025
CVE-2023-42977
7.8

This CVE describes a sandbox escape vulnerability in Apple operating systems where improper path validation allows malicious apps to break out of thei...

Apr 11, 2025
CVE-2025-29811
7.8

This vulnerability allows an authorized attacker with local access to a Windows system to exploit improper input validation in the Mobile Broadband co...

Apr 8, 2025
CVE-2025-24058
7.8

This vulnerability allows an authorized attacker with existing access to a Windows system to exploit improper input validation in the Desktop Window M...

Apr 8, 2025
CVE-2025-24062
7.8

CVE-2025-24062 is a local privilege escalation vulnerability in Windows Desktop Window Manager (DWM) Core Library due to improper input validation. An...

Apr 8, 2025
CVE-2025-24074
7.8

This vulnerability allows an authorized attacker with local access to a Windows system to elevate privileges through improper input validation in the ...

Apr 8, 2025
CVE-2025-1080
7.8

This vulnerability in LibreOffice allows attackers to craft malicious links using the 'vnd.libreoffice.command' URI scheme that can execute internal m...

Mar 4, 2025
CVE-2024-53029
7.8

This vulnerability allows a malicious guest virtual machine to trigger memory corruption in the host system by providing specially crafted buffer data...

Mar 3, 2025
CVE-2024-53031
7.8

This vulnerability allows a malicious guest virtual machine to cause memory corruption in the host system by manipulating type values in a controlled ...

Mar 3, 2025
CVE-2024-53012
7.8

This vulnerability allows memory corruption through improper input validation in clock device drivers on Qualcomm chipsets. Attackers could potentiall...

Mar 3, 2025
CVE-2024-53022
7.8

This vulnerability involves memory corruption during communication between primary and guest virtual machines in Qualcomm platforms, potentially allow...

Mar 3, 2025
CVE-2025-0514
7.8

This vulnerability in LibreOffice allows attackers to execute arbitrary Windows executables through malicious hyperlinks. When a user clicks on a spec...

Feb 25, 2025
CVE-2025-21375
7.8

This vulnerability in the Kernel Streaming WOW Thunk Service Driver allows attackers to escalate privileges from a lower-privileged account to SYSTEM ...

Feb 11, 2025
CVE-2025-21370
7.8

This vulnerability allows an authenticated attacker to elevate privileges within Windows Virtualization-Based Security (VBS) enclaves, potentially gai...

Jan 14, 2025
CVE-2025-21344
7.8

This vulnerability allows remote attackers to execute arbitrary code on Microsoft SharePoint Server by sending specially crafted requests. It affects ...

Jan 14, 2025
CVE-2025-21234
7.8

This vulnerability allows attackers to elevate privileges on Windows systems by exploiting the PrintWorkflowUserSvc service. It affects Windows system...

Jan 14, 2025
CVE-2025-21235
7.8

This vulnerability in Windows PrintWorkflowUserSvc allows attackers to elevate privileges from a standard user account to SYSTEM-level access. It affe...

Jan 14, 2025
CVE-2024-52982
7.8

Adobe Animate versions 23.0.8, 24.0.5 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a user ...

Dec 10, 2024
CVE-2024-43052
7.8

This vulnerability allows memory corruption in Qualcomm NPU (Neural Processing Unit) drivers when processing API calls with invalid input. Attackers c...

Dec 2, 2024
CVE-2024-0127
7.8

This vulnerability in NVIDIA vGPU software allows a guest OS user with kernel access to exploit improper input validation in the GPU kernel driver. Su...

Oct 26, 2024
CVE-2024-38261
7.8

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending sp...

Oct 8, 2024
CVE-2024-38244
7.8

This vulnerability allows attackers to elevate privileges on Windows systems by exploiting a flaw in the Kernel Streaming Service Driver. Attackers wi...

Sep 10, 2024
CVE-2024-38046
7.8

This PowerShell vulnerability allows authenticated attackers to execute arbitrary code with elevated privileges on affected systems. It affects Window...

Sep 10, 2024
CVE-2024-7977
7.8

This vulnerability allows a local attacker on Windows systems to escalate privileges by exploiting insufficient data validation in Google Chrome's ins...

Aug 21, 2024
CVE-2024-33657
7.8

This SMM (System Management Mode) vulnerability allows privileged attackers to execute arbitrary code, manipulate stack memory, and leak information f...

Aug 21, 2024
CVE-2024-41856
7.8

Adobe Illustrator versions 28.5, 27.9.4, 28.6, 27.9.5 and earlier contain an improper input validation vulnerability that could allow arbitrary code e...

Aug 14, 2024
CVE-2023-1577
7.8

A local path hijacking vulnerability in Lenovo Driver Manager allows attackers to execute arbitrary code with elevated privileges by manipulating sear...

Jul 31, 2024
CVE-2024-31310
7.8

This vulnerability in Android's AutofillManagerServiceImpl allows a malicious app to hide an enabled Autofill service from the system settings through...

Jul 9, 2024
CVE-2024-38052
7.8

This vulnerability in the Kernel Streaming WOW Thunk Service Driver allows attackers to escalate privileges on affected Windows systems. An authentica...

Jul 9, 2024
CVE-2024-38043
7.8

This PowerShell elevation of privilege vulnerability allows authenticated attackers to execute arbitrary code with SYSTEM privileges on affected Windo...

Jul 9, 2024
CVE-2024-38047
7.8

This PowerShell elevation of privilege vulnerability allows authenticated attackers to execute arbitrary code with SYSTEM privileges on affected Windo...

Jul 9, 2024
CVE-2024-30087
7.8

CVE-2024-30087 is a Win32k elevation of privilege vulnerability in Windows that allows authenticated attackers to gain SYSTEM-level privileges on affe...

Jun 11, 2024
CVE-2022-1242
7.8

CVE-2022-1242 is a vulnerability in Apport, Ubuntu's crash reporting tool, that allows local attackers to trick Apport into connecting to arbitrary so...

Jun 3, 2024
CVE-2024-3968
7.8

This vulnerability allows remote attackers to execute arbitrary code on OpenText iManager 3.2.6.0200 systems by exploiting a custom file upload task. ...

May 15, 2024
CVE-2024-34098
7.8

This CVE describes an Improper Input Validation vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a ma...

May 15, 2024
CVE-2024-23706
7.8

This vulnerability allows local attackers to bypass health data permissions on Android devices due to improper input validation. It enables local priv...

May 7, 2024
CVE-2024-21476
7.8

CVE-2024-21476 is a memory corruption vulnerability in Qualcomm components where improper validation of user-supplied channel IDs can lead to arbitrar...

May 6, 2024
CVE-2024-20064
7.8

This vulnerability in MediaTek's wlan service allows local attackers to write beyond allocated memory boundaries due to improper input validation. It ...

May 6, 2024
CVE-2024-26170
7.8

This vulnerability in Windows Composite Image File System (CimFS) allows attackers to gain elevated privileges on affected systems. It affects Windows...

Mar 12, 2024
CVE-2024-23294
7.8

This vulnerability in macOS allows attackers to execute arbitrary code by processing malicious input. It affects macOS systems before Sonoma 14.4. Use...

Mar 8, 2024
CVE-2024-0021
7.8

This vulnerability allows an app in the Android work profile to improperly enable notification listener services due to a logic error in NotificationA...

Feb 16, 2024
CVE-2024-21315
7.8

This vulnerability in Microsoft Defender for Endpoint allows attackers to elevate privileges on affected systems. It enables local authenticated attac...

Feb 13, 2024
CVE-2023-42826
7.8

This vulnerability in macOS allows arbitrary code execution when processing malicious files. Attackers can exploit improper input validation to execut...

Jan 10, 2024
CVE-2023-48634
7.8

Adobe After Effects has an improper input validation vulnerability that allows arbitrary code execution when a user opens a malicious file. This affec...

Dec 13, 2023
CVE-2023-36407
7.8

This vulnerability allows an authenticated attacker with local access to a Hyper-V guest virtual machine to execute arbitrary code with SYSTEM privile...

Nov 14, 2023
CVE-2023-36731
7.8

This is a Win32k elevation of privilege vulnerability in Windows that allows an authenticated attacker to gain SYSTEM-level privileges on a compromise...

Oct 10, 2023
CVE-2023-39137
7.8

This vulnerability in Archive v3.3.7 allows attackers to spoof ZIP filenames, leading to inconsistent filename parsing. This can enable attackers to h...

Aug 30, 2023
CVE-2023-21272
7.8

This vulnerability in Android's Uri.java allows improper URI permission grants due to insufficient input validation. It enables local privilege escala...

Aug 14, 2023
CVE-2023-26587
7.8

This vulnerability in Intel Easy Streaming Wizard allows authenticated local users to escalate privileges through improper input validation. It affect...

Aug 11, 2023
CVE-2023-21138
7.8

This Android vulnerability allows local privilege escalation through improper input validation in CallRedirectionProcessor.java. An attacker could exp...

Jun 15, 2023

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,511 CVEs classified as CWE-20, with 263 rated critical and 922 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free