CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,517
Total CVEs
268
Critical
923
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 76
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Cisco 42
8 Huawei 40
9 Color 40
10 Reolink 36

All Improper Input Validation CVEs (1,517)

CVE-2020-12929
7.8

This vulnerability in AMD Graphics Driver's Platform Security Processor (PSP) trusted applications allows local attackers to bypass security restricti...

Nov 15, 2021
CVE-2021-30254
7.8

This vulnerability allows attackers to execute arbitrary code or cause denial of service through a buffer overflow in Qualcomm's factory calibration a...

Nov 12, 2021
CVE-2021-34597
7.8

This vulnerability allows an attacker to write arbitrary files outside the intended project directory by exploiting improper input validation in PC Wo...

Nov 4, 2021
CVE-2021-30693
7.8

This vulnerability allows arbitrary code execution by processing a maliciously crafted image. It affects macOS, iOS, and iPadOS systems with insuffici...

Sep 8, 2021
CVE-2021-36048
7.8

CVE-2021-36048 is an improper input validation vulnerability in Adobe XMP Toolkit SDK that could allow arbitrary code execution when a user opens a ma...

Sep 1, 2021
CVE-2021-30881
7.8

This vulnerability allows arbitrary code execution when processing malicious archive files on Apple devices. Attackers can exploit this by tricking us...

Aug 24, 2021
CVE-2021-37663
7.8

This vulnerability in TensorFlow's QuantizeV2 operation allows attackers to trigger undefined behavior by accessing invalid memory locations. Attacker...

Aug 12, 2021
CVE-2021-0084
7.8

This vulnerability allows authenticated local users to escalate privileges on Linux systems using Intel Ethernet Controllers X722 and 800 series with ...

Aug 11, 2021
CVE-2021-0600
7.8

This vulnerability allows attackers to trick users into activating malicious device admin apps on Android devices through improper input validation in...

Jul 14, 2021
CVE-2021-3612
7.8

A local privilege escalation vulnerability in Linux kernel versions before 5.9-rc1 allows attackers with local access to crash systems or gain root pr...

Jul 9, 2021
CVE-2021-0511
7.8

This vulnerability allows local attackers to inject malicious bytecode into Android apps during compilation, potentially leading to privilege escalati...

Jun 21, 2021
CVE-2020-12985
7.8

This vulnerability in AMD Graphics Driver for Windows 10 allows attackers to exploit insufficient pointer validation to escalate privileges or cause d...

Jun 11, 2021
CVE-2021-0481
7.8

This Android vulnerability allows local privilege escalation through unauthorized file access when a user interacts with a malicious app. It affects A...

Jun 11, 2021
CVE-2021-0485
7.8

This vulnerability allows local privilege escalation on Android 11 devices by bypassing background process restrictions. Attackers can gain elevated p...

Jun 11, 2021
CVE-2021-25414
7.8

CVE-2021-25414 is a vulnerability in Samsung Contacts that allows local attackers to copy or overwrite arbitrary files due to improper intent sanitiza...

Jun 11, 2021
CVE-2021-25401
7.8

This CVE describes an intent redirection vulnerability in Samsung Health that allows attackers to execute privileged actions without proper authorizat...

Jun 11, 2021
CVE-2020-11178
7.8

This vulnerability allows trusted applications in Qualcomm's TrustZone to overwrite protected memory regions of other applications. It affects multipl...

Jun 9, 2021
CVE-2021-3490
7.8

This CVE-2021-3490 is a Linux kernel vulnerability in eBPF's ALU32 bounds tracking for bitwise operations (AND, OR, XOR). It allows local attackers to...

Jun 4, 2021
CVE-2020-27823
7.8

This vulnerability in OpenJPEG's encoder allows attackers to pass specially crafted x,y offset input during encoding, potentially leading to memory co...

May 13, 2021
CVE-2021-31198
7.8

CVE-2021-31198 is a remote code execution vulnerability in Microsoft Exchange Server that allows attackers to execute arbitrary code on affected serve...

May 11, 2021
CVE-2021-1084
7.8

The NVIDIA vGPU driver vulnerability (CVE-2021-1084) allows attackers to exploit improper input validation in the guest kernel mode driver and Virtual...

Apr 29, 2021
CVE-2021-1080
7.8

This vulnerability in NVIDIA vGPU software allows attackers to exploit improper input validation in the Virtual GPU Manager to potentially disclose se...

Apr 29, 2021
CVE-2021-1448
7.8

This vulnerability allows authenticated local attackers on Cisco Firepower Threat Defense devices running in multi-instance mode to execute arbitrary ...

Apr 29, 2021
CVE-2021-22678
7.8

CVE-2021-22678 is a memory corruption vulnerability in Cscape software that allows attackers to execute arbitrary code by tricking users into opening ...

Apr 23, 2021
CVE-2021-26415
7.8

CVE-2021-26415 is an elevation of privilege vulnerability in Windows Installer that allows authenticated attackers to execute arbitrary code with SYST...

Apr 13, 2021
CVE-2021-21069
7.8

This vulnerability allows a local attacker to escalate privileges on systems running vulnerable versions of Adobe Creative Cloud Desktop Application. ...

Mar 12, 2021
CVE-2021-20268
7.8

This CVE describes an out-of-bounds access vulnerability in the Linux kernel's eBPF code verifier. A local attacker can exploit this flaw to crash the...

Mar 9, 2021
CVE-2020-11194
7.8

This vulnerability allows attackers to perform out-of-bounds memory access in the Trusted Application (TA) component of Qualcomm Snapdragon chipsets d...

Feb 22, 2021
CVE-2020-24453
7.8

This vulnerability in Intel EPID SDK allows authenticated local users to escalate privileges through improper input validation. It affects systems usi...

Feb 17, 2021
CVE-2020-12366
7.8

This vulnerability in Intel Graphics Drivers allows a privileged user to escalate privileges via local access due to insufficient input validation. It...

Feb 17, 2021
CVE-2020-12377
7.8

This vulnerability allows authenticated users with local access to Intel server hardware to potentially escalate privileges through insufficient input...

Feb 17, 2021
CVE-2020-26193
7.8

Dell EMC PowerScale OneFS versions 8.1.0 through 9.1.0 contain an improper input validation vulnerability that allows authenticated users with the ISI...

Feb 9, 2021
CVE-2020-12122
7.8

This vulnerability in Max Secure Max Spyware Detector allows local users to send malicious input via IOCtl 0x2200019 to the MaxProc64.sys driver, caus...

Feb 5, 2021
CVE-2021-1260
7.8

CVE-2021-1260 allows authenticated attackers to execute arbitrary commands with root privileges on Cisco SD-WAN devices through command injection vuln...

Jan 20, 2021
CVE-2021-1262
7.8

CVE-2021-1262 allows authenticated attackers to execute arbitrary commands with root privileges on Cisco SD-WAN devices through command injection vuln...

Jan 20, 2021
CVE-2020-27844
7.8

CVE-2020-27844 is an out-of-bounds write vulnerability in OpenJPEG's t2.c file that allows attackers to compromise confidentiality, integrity, and ava...

Jan 5, 2021
CVE-2020-27828
7.8

CVE-2020-27828 is an arbitrary out-of-bounds write vulnerability in the jpc encoder component of the Jasper image processing library. Attackers can ex...

Dec 11, 2020
CVE-2020-16968
7.8

This vulnerability allows remote code execution via specially crafted files processed by Windows Camera Codec Pack. Attackers can execute arbitrary co...

Oct 16, 2020
CVE-2025-57528
7.7

This vulnerability in Tenda AC6 routers allows attackers to cause denial of service through buffer overflow in the formSetCfm function. Attackers can ...

Sep 19, 2025
CVE-2025-54248
7.7

Adobe Experience Manager versions 6.5.23.0 and earlier have an improper input validation vulnerability that allows low-privileged attackers to bypass ...

Sep 9, 2025
CVE-2025-47281
7.7

This CVE describes a Denial of Service vulnerability in Kyverno policy engine versions 1.14.1 and below. Attackers with permissions to create or updat...

Jul 23, 2025
CVE-2024-38307
7.7

This vulnerability in Intel AMT and Standard Manageability firmware allows authenticated users to cause denial of service through improper input valid...

Feb 12, 2025
CVE-2024-57960
7.7

This CVE describes an input verification vulnerability in Huawei's ExternalStorageProvider module that could allow attackers to access sensitive infor...

Feb 6, 2025
CVE-2024-0793
7.7

A denial-of-service vulnerability in kube-controller-manager occurs when applying a Horizontal Pod Autoscaler (HPA) configuration YAML file that lacks...

Nov 17, 2024
CVE-2024-43373
7.7

CVE-2024-43373 is an arbitrary file write vulnerability in the webcrack JavaScript reverse engineering tool on Windows systems. Attackers can exploit ...

Aug 15, 2024
CVE-2023-22342
7.7

This vulnerability allows authenticated Windows users with local access to potentially escalate privileges through improper input validation in Intel ...

Feb 14, 2024
CVE-2023-52137
7.7

This CVE describes a command injection vulnerability in the tj-actions/verify-changed-files GitHub Action. Attackers can inject malicious commands thr...

Dec 29, 2023
CVE-2023-22835
7.7

This vulnerability allows authenticated users of Foundry Issues to submit malformed data that causes a denial of service, disrupting frontend function...

Jul 10, 2023
CVE-2022-3767
7.7

CVE-2022-3767 is a vulnerability in GitLab's DAST analyzer where missing validation allows custom request headers to be sent with every request regard...

Mar 9, 2023
CVE-2021-35116
7.7

This vulnerability allows a malicious Android application (APK) to load a specially crafted model into the Qualcomm CDSP (Compute DSP), potentially co...

Jun 14, 2022

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,517 CVEs classified as CWE-20, with 268 rated critical and 923 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free