CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,516)
This is a Win32k elevation of privilege vulnerability in Windows that allows an authenticated attacker to gain SYSTEM-level privileges on a compromise...
Oct 10, 2023This vulnerability in Archive v3.3.7 allows attackers to spoof ZIP filenames, leading to inconsistent filename parsing. This can enable attackers to h...
Aug 30, 2023This vulnerability in Android's Uri.java allows improper URI permission grants due to insufficient input validation. It enables local privilege escala...
Aug 14, 2023This vulnerability in Intel Easy Streaming Wizard allows authenticated local users to escalate privileges through improper input validation. It affect...
Aug 11, 2023This Android vulnerability allows local privilege escalation through improper input validation in CallRedirectionProcessor.java. An attacker could exp...
Jun 15, 2023This vulnerability in Android's notification access settings allows local privilege escalation without user interaction. An attacker could exploit imp...
Jun 15, 2023CVE-2023-29359 is a Windows Graphics Device Interface (GDI) vulnerability that allows local attackers to escalate privileges from a low-privileged use...
Jun 14, 2023This vulnerability allows memory corruption in Qualcomm WLAN HOST drivers when processing WMI events from firmware. Attackers could potentially execut...
Jun 6, 2023This vulnerability allows a malicious app to dynamically register a BroadcastReceiver using System App permissions due to improper input validation in...
Apr 19, 2023Adobe Substance 3D Stager versions 2.0.1 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a us...
Apr 12, 2023This CVE describes an improper input validation vulnerability in Adobe Acrobat Reader that could allow arbitrary code execution when a user opens a ma...
Apr 12, 2023This vulnerability in Adobe Acrobat Reader allows attackers to execute arbitrary code on a victim's system when they open a malicious PDF file. It aff...
Apr 12, 2023This vulnerability allows an attacker to gain SYSTEM-level privileges on Windows systems by exploiting a flaw in the Win32k driver. It affects Windows...
Apr 11, 2023CVE-2023-24893 is a remote code execution vulnerability in Visual Studio Code that allows attackers to execute arbitrary code on a user's system by tr...
Apr 11, 2023This vulnerability allows remote attackers to execute arbitrary code on affected systems by exploiting improper input validation in Microsoft's ODBC a...
Apr 11, 2023This vulnerability allows attackers to execute arbitrary code on systems running IrfanView by tricking users into opening a malicious PDF file. The im...
Mar 28, 2023Adobe Dimension versions 3.4.7 and earlier contain an improper input validation vulnerability that could allow arbitrary code execution when a user op...
Mar 28, 2023Adobe Dimension versions 3.4.7 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a user opens a...
Mar 28, 2023Adobe Dimension versions 3.4.7 and earlier contain an improper input validation vulnerability that allows arbitrary code execution when a user opens a...
Mar 28, 2023CVE-2023-25865 is an improper input validation vulnerability in Adobe Substance 3D Stager that allows arbitrary code execution when a user opens a mal...
Mar 27, 2023Adobe Substance 3D Stager has an improper input validation vulnerability that allows arbitrary code execution when a user opens a malicious file. This...
Mar 27, 2023CVE-2023-25859 is an improper input validation vulnerability in Adobe Illustrator that allows arbitrary code execution when a user opens a malicious f...
Mar 22, 2023This vulnerability in Windows Resilient File System (ReFS) allows an authenticated attacker to gain SYSTEM-level privileges on affected systems. It af...
Mar 14, 2023CVE-2023-22239 is an improper input validation vulnerability in Adobe After Effects that allows arbitrary code execution when a user opens a malicious...
Feb 17, 2023CVE-2023-22228 is an improper input validation vulnerability in Adobe Bridge that allows arbitrary code execution when a user opens a malicious file. ...
Feb 17, 2023This CVE describes an Improper Input Validation vulnerability in Adobe Photoshop that allows arbitrary code execution when a user opens a malicious fi...
Feb 17, 2023This vulnerability in Adobe FrameMaker allows arbitrary code execution when a user opens a malicious file. Attackers can exploit improper input valida...
Feb 17, 2023This vulnerability allows authenticated users on SiPass integrated access control systems to execute arbitrary commands with root privileges through i...
Feb 14, 2023This vulnerability allows a local authenticated malicious user to send malicious input to a named pipe in Dell Alienware Command Center, potentially l...
Feb 10, 2023CVE-2022-34866 is an insufficient data verification vulnerability in Passage Drive that allows arbitrary command execution with LocalSystem privileges...
Jul 20, 2022This vulnerability allows local attackers to launch activities with Galaxy Store privileges due to improper input validation in AppsPackageInstaller. ...
Jul 12, 2022This vulnerability allows local attackers to launch activities with Galaxy Store privileges through improper input validation in BillingPackageInstall...
Jul 12, 2022This vulnerability in the Android kernel's Mali GPU driver allows local attackers to execute arbitrary code without user interaction. It enables privi...
Jun 15, 2022This vulnerability in Huawei's AMS module allows improper input validation that could lead to privilege escalation. Attackers could exploit this to ga...
Jun 13, 2022This vulnerability allows a privileged user with local access to potentially escalate privileges through improper input validation in BIOS firmware on...
May 12, 2022This vulnerability allows a privileged user with local access to potentially escalate privileges through improper input validation in the BIOS authent...
May 12, 2022This vulnerability in AMD Secure Processor firmware allows insufficient address validation in system calls, potentially enabling arbitrary code execut...
May 10, 2022Adobe Photoshop has an improper input validation vulnerability when parsing PCX files that could allow arbitrary code execution. Attackers can craft m...
May 6, 2022CVE-2021-3624 is an integer overflow vulnerability in dcraw, a RAW image decoder. When processing a malicious X3F image file, this vulnerability can l...
Apr 18, 2022This vulnerability in Android Settings allows an attacker to spoof app names due to improper input validation, potentially leading to local privilege ...
Mar 30, 2022This vulnerability in Android Settings allows an attacker to misrepresent which app is requesting to add a Wi-Fi network due to improper input validat...
Mar 30, 2022CVE-2021-44462 is a memory corruption vulnerability in Horner Automation Cscape EnvisionRV software versions v4.50.3.1 and prior. Attackers can exploi...
Mar 25, 2022This vulnerability allows authenticated users with local access to Intel Quartus Prime Pro Edition to potentially escalate privileges through improper...
Feb 9, 2022This vulnerability allows an authenticated attacker with local access to improperly validate input in Intel processor firmware, potentially enabling p...
Feb 9, 2022CVE-2021-44422 is a heap-based buffer overflow vulnerability in Open Design Alliance Drawings SDK that allows remote code execution when processing ma...
Dec 21, 2021This vulnerability in Android's Parcel serialization allows local privilege escalation without user interaction. An attacker could exploit improper in...
Dec 15, 2021This vulnerability in AMD System Management Unit (SMU) allows a malicious user to manipulate mailbox entries, potentially leading to arbitrary code ex...
Nov 16, 2021This vulnerability allows attackers to execute arbitrary code by exploiting insufficient validation of BIOS image length in AMD ASP Firmware. It affec...
Nov 16, 2021This vulnerability in AMD's Platform Security Processor (PSP) allows attackers to manipulate privileged registers on the System Management Network, po...
Nov 16, 2021This vulnerability in AMD processors allows attackers to bypass memory integrity protections when Secure Encrypted Virtualization (SEV) with Secure Ne...
Nov 16, 2021About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,516 CVEs classified as CWE-20, with 268 rated critical and 922 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free