CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,644
Total CVEs
318
Critical
1,000
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 83
3 Cisco 67
4 Intel 61
5 Qualcomm 48
6 Apache 47
7 Adobe 42
8 Huawei 42
9 Apple 40
10 Color 40

All Improper Input Validation CVEs (1,644)

CVE-2021-23048
7.5

This vulnerability in F5 BIG-IP systems allows remote attackers to cause denial of service by sending specially crafted GTP messages to virtual server...

Sep 14, 2021
CVE-2021-37206
7.5

This vulnerability affects Siemens SIPROTEC 5 relays with specific CPU variants. An unauthenticated remote attacker can send specially crafted webpack...

Sep 14, 2021
CVE-2021-3580
7.5

CVE-2021-3580 is a vulnerability in nettle's RSA decryption functions where specially crafted ciphertext can cause application crashes and denial of s...

Aug 5, 2021
CVE-2021-26605
7.5

CVE-2021-26605 is an improper input validation vulnerability in ezPDFReader's JSON-RPC communication that allows remote attackers to execute arbitrary...

Aug 5, 2021
CVE-2021-33196
7.5

This vulnerability in Go's archive/zip package allows attackers to cause denial-of-service by triggering a panic when processing specially crafted ZIP...

Aug 2, 2021
CVE-2021-22445
7.5

This CVE describes an input verification vulnerability in Huawei smartphones that allows attackers to cause system resets through improper input valid...

Aug 2, 2021
CVE-2021-34432
7.5

This vulnerability allows remote attackers to crash Eclipse Mosquitto MQTT broker servers by sending a specially crafted PUBLISH packet with zero-leng...

Jul 27, 2021
CVE-2021-26036
7.5

This vulnerability in Joomla! CMS allows attackers to manipulate the usergroups table through insufficient input validation, potentially causing denia...

Jul 7, 2021
CVE-2021-32566
7.5

CVE-2021-32566 is an improper input validation vulnerability in Apache Traffic Server's HTTP/2 implementation that allows attackers to cause a denial-...

Jun 30, 2021
CVE-2020-7871
7.5

CVE-2020-7871 is a command injection vulnerability in Cnesty Helpcom software that allows unauthenticated attackers to execute arbitrary commands on a...

Jun 29, 2021
CVE-2021-35041
7.5

This vulnerability in FISCO-BCOS blockchain nodes allows malicious nodes to send malformed packets that cause memory exhaustion and crashes. It affect...

Jun 24, 2021
CVE-2020-15379
7.5

This vulnerability in Brocade SANnav allows remote attackers to cause a denial-of-service condition by sending specially crafted data with excessive l...

Jun 9, 2021
CVE-2021-22359
7.5

This is a denial-of-service vulnerability affecting specific Huawei S5700 and S6700 switch models. An attacker can send specially crafted messages to ...

May 27, 2021
CVE-2021-22699
7.5

An improper input validation vulnerability in Schneider Electric Modicon M241/M251 logic controllers allows attackers to cause denial of service via s...

May 26, 2021
CVE-2020-36332
7.5

CVE-2020-36332 is a memory exhaustion vulnerability in libwebp library versions before 1.0.1. When processing specially crafted WebP images, libwebp a...

May 21, 2021
CVE-2020-11268
7.5

CVE-2020-11268 is a vulnerability in Qualcomm Snapdragon chipsets where processing a specially crafted System Information Block (SIB) message can caus...

May 7, 2021
CVE-2021-1513
7.5

This vulnerability in Cisco SD-WAN Software allows unauthenticated remote attackers to cause affected devices to reload by sending malformed packets, ...

May 6, 2021
CVE-2021-29486
7.5

CVE-2021-29486 is a denial-of-service vulnerability in the cumulative-distribution-function npm library where passing string data instead of numeric a...

Apr 30, 2021
CVE-2021-31863
7.5

This vulnerability allows authenticated Redmine users to read arbitrary local files accessible by the application server process due to insufficient i...

Apr 28, 2021
CVE-2021-31555
7.5

This vulnerability in MediaWiki's OAuth extension allows attackers to submit overly long oarc_version parameters, potentially causing buffer overflows...

Apr 22, 2021
CVE-2021-29430
7.5

CVE-2021-29430 is a denial-of-service vulnerability in Sydent, a Matrix identity server, where attackers can send oversized HTTP requests or receive o...

Apr 15, 2021
CVE-2021-1252
7.5

This vulnerability in ClamAV's Excel macro parser allows remote attackers to cause denial of service by sending specially crafted Excel files. When ex...

Apr 8, 2021
CVE-2021-21404
7.5

This vulnerability allows attackers to crash Syncthing file synchronization software and its relay server by sending messages with negative length fie...

Apr 6, 2021
CVE-2018-1110
7.5

A vulnerability in knot-resolver DNS software allows malformed DNS messages to cause denial of service by crashing the service. This affects organizat...

Mar 30, 2021
CVE-2021-20222
7.5

This vulnerability in Keycloak's new account console allows attackers to execute malicious code via manipulated referrer URLs. It affects Keycloak dep...

Mar 23, 2021
CVE-2021-26788
7.5

CVE-2021-26788 is an incorrect input validation vulnerability in Oryx Embedded CycloneTCP that allows unauthenticated attackers to cause denial of ser...

Mar 8, 2021
CVE-2021-23131
7.5

This vulnerability in Joomla's template manager allows attackers to bypass input validation, potentially leading to unauthorized actions or code execu...

Mar 4, 2021
CVE-2021-27921
7.5

This vulnerability in Pillow (Python Imaging Library) allows attackers to cause denial of service through memory exhaustion by exploiting improper siz...

Mar 3, 2021
CVE-2021-27923
7.5

This vulnerability in Pillow (Python Imaging Library) allows attackers to cause denial of service through memory exhaustion by providing specially cra...

Mar 3, 2021
CVE-2021-27179
7.5

This vulnerability allows remote attackers to crash the telnet daemon on FiberHome HG6245D devices by sending a specific malformed string. This causes...

Feb 10, 2021
CVE-2020-0236
7.5

This vulnerability in Android's Bluetooth A2DP audio streaming protocol allows attackers to read memory beyond intended boundaries without user intera...

Jan 26, 2021
CVE-2021-0313
7.5

This vulnerability in Android's TextView component allows remote attackers to cause denial of service (slowdown or crash) by sending specially crafted...

Jan 11, 2021
CVE-2020-35616
7.5

This vulnerability in Joomla! allows authenticated users to bypass write access controls (ACL) due to insufficient input validation when handling ACL ...

Dec 28, 2020
CVE-2020-14273
7.5

HCL Domino has a Denial of Service vulnerability in its public API due to improper input validation. Unauthenticated attackers can send specially craf...

Dec 28, 2020
CVE-2020-24679
7.5

CVE-2020-24679 is a vulnerability in ABB's S+ Operations and S+ Historian services where specially crafted messages can cause denial of service or pot...

Dec 22, 2020
CVE-2020-35623
7.5

This vulnerability in the CasAuth extension for MediaWiki allows user impersonation through trivial username manipulation using bidirectional override...

Dec 21, 2020
CVE-2020-25195
7.5

This vulnerability allows attackers to bypass client-side input validation on Host Engineering ECOM100 modules, potentially causing device crashes thr...

Dec 15, 2020
CVE-2020-5680
7.5

This vulnerability in EC-CUBE e-commerce software allows remote attackers to cause denial-of-service conditions through improper input validation. It ...

Dec 3, 2020
CVE-2020-14234
7.5

HCL Domino servers are vulnerable to denial of service attacks due to improper input validation. An attacker can send specially crafted input to crash...

Nov 21, 2020
CVE-2020-3444
7.5

This vulnerability allows unauthenticated remote attackers to bypass layer 3 and layer 4 traffic filters in Cisco SD-WAN Software by sending specially...

Nov 6, 2020
CVE-2018-19952
7.5

This SQL injection vulnerability in QNAP Music Station allows remote attackers to extract sensitive application data by injecting malicious SQL querie...

Nov 2, 2020
CVE-2019-8633
7.5

This CVE describes an input validation vulnerability in Apple operating systems that allows applications to read restricted memory. Successful exploit...

Oct 27, 2020
CVE-2020-1679
7.5

This vulnerability affects Juniper Networks PTX and QFX Series devices running Junos OS with packet sampling configured using tunnel-observation mpls-...

Oct 16, 2020
CVE-2020-1662
7.5

This vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows remote attackers to cause a denial of service by crashing the routing proc...

Oct 16, 2020
CVE-2020-9931
7.5

This vulnerability allows a remote attacker to cause denial of service by sending specially crafted input to iOS/iPadOS devices, leading to unexpected...

Oct 16, 2020
CVE-2020-9914
7.5

This CVE describes a Bluetooth input validation vulnerability in Apple devices that allows attackers in a privileged network position to send malforme...

Oct 16, 2020
CVE-2020-26597
7.5

This vulnerability in LG Android devices allows attackers to cause denial of service through Wi-Fi subsystem crashes due to incorrect input validation...

Oct 6, 2020
CVE-2020-13387
7.5

Pexip Infinity video conferencing platforms before version 23.4 have insufficient input validation in H.323 protocol handling, allowing attackers to c...

Sep 25, 2020
CVE-2020-3133
7.5

This vulnerability allows unauthenticated remote attackers to bypass email content filters on Cisco Email Security Appliances by sending specially cra...

Sep 23, 2020
CVE-2020-24940
7.5

This vulnerability in Laravel allows attackers to bypass mass assignment protection by manipulating table names in database queries, potentially savin...

Sep 4, 2020

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,644 CVEs classified as CWE-20, with 318 rated critical and 1,000 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free