CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,528)
This CVE describes a command injection vulnerability in the tj-actions/verify-changed-files GitHub Action. Attackers can inject malicious commands thr...
Dec 29, 2023This vulnerability allows authenticated users of Foundry Issues to submit malformed data that causes a denial of service, disrupting frontend function...
Jul 10, 2023CVE-2022-3767 is a vulnerability in GitLab's DAST analyzer where missing validation allows custom request headers to be sent with every request regard...
Mar 9, 2023This vulnerability allows a malicious Android application (APK) to load a specially crafted model into the Qualcomm CDSP (Compute DSP), potentially co...
Jun 14, 2022This vulnerability allows attackers to launch arbitrary activities with system privileges on Samsung devices due to improper input validation in Setti...
May 3, 2022An unauthenticated attacker can send specially crafted HTTP requests to FortiMail's web server CGI facilities to manipulate the script interpreter's e...
Mar 1, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests targeting t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests with...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests targeting t...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the cgiserver.cgi JSON command ...
Jan 28, 2022CVE-2021-44411 is a denial-of-service vulnerability in Reolink RLC-410W cameras where a specially crafted HTTP request to the cgiserver.cgi JSON parse...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the cgiserver.cgi JSON command ...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests to the cgis...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W camera firmware allows attackers to cause device reboots via specially crafted HTTP requests to ...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests to the cgis...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests targeting t...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022This vulnerability allows remote attackers to cause a denial of service by sending a specially crafted HTTP request to the Reolink RLC-410W camera's c...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests targeting t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots by sending specially crafted HTTP requests to t...
Jan 28, 2022A denial-of-service vulnerability in Reolink RLC-410W cameras allows attackers to cause device reboots via specially crafted HTTP requests targeting t...
Jan 28, 2022This vulnerability in Samsung's Dressroom app allows local attackers to read and write arbitrary files without proper permissions due to improper inte...
Jan 10, 2022This vulnerability in Samsung's LDFW (likely a device firmware component) allows attackers to execute arbitrary code due to improper input validation....
Dec 8, 2021This vulnerability allows authenticated administrators in Zscaler Internet Access (ZIA) to execute backend functions through improper input validation...
Feb 23, 2026This Broken Object Level Authorization vulnerability in Onlook web application allows authenticated attackers to modify, delete, or manipulate tags on...
Nov 7, 2025This CVE describes an Improper Input Validation vulnerability in Adobe Commerce that allows authenticated admin attackers to read arbitrary files from...
Oct 10, 2024This vulnerability in Qualcomm Core services allows information disclosure when processing Diag commands. Attackers could potentially access sensitive...
Jan 2, 2024A critical input validation flaw in TOBY-L2 cellular modules allows attackers with physical serial access to execute arbitrary operating system comman...
Dec 20, 2023This vulnerability allows attackers to elevate privileges on systems running affected .NET, .NET Framework, and Visual Studio versions. An authenticat...
Nov 14, 2023This CVE allows attackers to inject malicious annotations into Ingress nginx configurations, leading to arbitrary command execution on the host system...
Oct 25, 2023CVE-2023-32721 is a stored cross-site scripting (XSS) vulnerability in Zabbix's web application that allows attackers to inject malicious scripts into...
Oct 12, 2023CVE-2021-25745 is a vulnerability in ingress-nginx where users with permissions to create or update Ingress objects can exploit the path field to obta...
May 6, 2022This CVE describes an improper boundary check vulnerability in Samsung's UWB (Ultra-Wideband) firmware that allows attackers to write arbitrary memory...
Apr 11, 2022CVE-2021-29462 is a DNS rebinding vulnerability in the Portable SDK for UPnP Devices (libupnp) that allows attackers to bypass same-origin policy rest...
Apr 20, 2021This vulnerability in the sopel-channelmgnt plugin allows attackers to bypass restrictions and kick the bot from IRC channels when kicking multiple us...
Apr 9, 2021About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,528 CVEs classified as CWE-20, with 268 rated critical and 934 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free