CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,648)
This vulnerability allows unauthenticated remote attackers to bypass email content filters on Cisco Email Security Appliances by sending specially cra...
Sep 23, 2020This vulnerability in Laravel allows attackers to bypass mass assignment protection by manipulating table names in database queries, potentially savin...
Sep 4, 2020An unauthenticated remote attacker can send a specially crafted type 8 message to Trading Technologies Messaging service on TCP port 10200, causing th...
Sep 2, 2020This vulnerability in LG mobile devices allows attackers to cause a service crash through incorrect input validation. It affects LG devices running An...
Aug 31, 2020This vulnerability in LG mobile devices with specific Android versions allows application crashes due to incorrect input validation at the application...
Aug 31, 2020IBM Spectrum Protect 7.1 and 8.1 contains an input validation vulnerability that allows attackers to cause denial of service by sending specially craf...
Aug 28, 2020HashiCorp vault-ssh-helper versions up to 0.1.6 incorrectly accept Vault-issued SSH OTPs for an entire subnet rather than a specific IP address, allow...
Aug 20, 2020This vulnerability in Nim's standard library httpClient allows malicious servers to provide negative Content-Length values, which the client fails to ...
Aug 14, 2020This vulnerability allows attackers to modify project configuration files in Schneider Electric's Easergy Builder software due to improper input valid...
Jul 23, 2020This vulnerability allows unauthenticated remote attackers to cause denial-of-service on C-MORE HMI EA9 touch screen panels by sending specially craft...
Jul 23, 2020This vulnerability in Huawei SIP modules allows remote attackers to cause denial of service by sending specially crafted SIP messages. Successful expl...
Jul 8, 2020CVE-2020-15503 is an integer overflow vulnerability in LibRaw's thumbnail processing code that allows attackers to cause heap-based buffer overflows b...
Jul 2, 2020This CVE-2019-11253 vulnerability in Kubernetes allows authorized users to send malicious YAML or JSON payloads to the API server, causing excessive C...
Oct 17, 2019This vulnerability in EVerest EV charging software allows attackers to cause denial of service by triggering assertion failures that crash individual ...
Jan 21, 2026An unauthenticated adjacent attacker can send a malformed DHCP packet to crash the Juniper DHCP daemon (jdhcpd) when dhcp-security is enabled, causing...
Apr 9, 2025An unauthenticated adjacent attacker can crash the ppp_ma process on Cisco ASR 9000 routers running IOS XR with BNG and PPPoE termination, causing den...
Mar 13, 2024This vulnerability in Cisco IOS XR Software allows an unauthenticated attacker on the same network segment to send specially crafted Ethernet frames t...
Mar 13, 2024This vulnerability in Hitron Systems DVR HVR-16781 allows attackers to perform network attacks when default admin credentials are used. The improper i...
Jan 23, 2024This vulnerability in Hitron Systems DVR devices allows attackers to perform network attacks when default admin credentials are used. It affects Hitro...
Jan 23, 2024This vulnerability in Hitron Systems DVR HVR-4781 allows attackers to perform network attacks when the device uses default admin credentials. The impr...
Jan 23, 2024This vulnerability involves weak configuration in Automotive systems when a Virtual Machine (VM) processes listener requests from the Trusted Executio...
Oct 3, 2023CVE-2023-36873 is a spoofing vulnerability in the .NET Framework that allows attackers to manipulate data or impersonate legitimate sources. This affe...
Aug 8, 2023This vulnerability allows local attackers to execute arbitrary code on OTRS systems by injecting malicious code into ACL module comments or names duri...
Mar 20, 2023This vulnerability in Intel SUR software allows unauthenticated attackers to potentially escalate privileges via network access due to improper input ...
Feb 16, 2023An improper input validation vulnerability in Juniper's DHCP daemon (jdhcpd) allows adjacent unauthenticated attackers to crash the service by sending...
Jan 19, 2022OctoRPKI has a path traversal vulnerability where malicious repositories can write files outside the designated cache directory using '..' sequences i...
Nov 11, 2021This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted UDLD packets to Cisco networking devices, ...
Sep 23, 2021This vulnerability allows an attacker to cause a denial of service (DoS) by sending a specially crafted DHCP packet to Juniper Junos OS devices runnin...
Apr 22, 2021This vulnerability in mbsync allows a malicious or compromised IMAP server to use specially crafted mailbox names containing '..' path components to a...
Feb 23, 2021A vulnerability in Cisco Firepower Threat Defense (FTD) Software allows an unauthenticated adjacent attacker to cause denial of service by sending mal...
Oct 21, 2020This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted CAPWAP packets to Cisco Catalyst 9800 Seri...
Sep 24, 2020This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted CAPWAP packets to Cisco Catalyst 9800 Seri...
Sep 24, 2020This vulnerability in Cisco IOS XE Software allows an unauthenticated attacker on the same network segment to cause a denial of service by sending spe...
Sep 24, 2020This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted PROFINET packets to Cisco IOS/IOS XE devic...
Sep 24, 2020This vulnerability allows an unauthenticated attacker on the same network to send a crafted 802.1x packet during wireless client authentication, causi...
Sep 24, 2020This CVE describes a remote code execution vulnerability in yuan1994 tpadmin's WebUploader component through insecure deserialization in preview.php. ...
Feb 7, 2026OnboardLite versions before commit 1d32081a66f21bcf41df1ecb672490b13f6e429f contain a stored cross-site scripting (XSS) vulnerability that allows atta...
Jan 19, 2026This vulnerability allows a malicious companion application to retain elevated privileges after being disassociated from a device, enabling local priv...
Dec 8, 2025This vulnerability in pmTicket Project-Management-Software allows remote attackers to execute arbitrary code through deserialization of manipulated us...
Sep 29, 2025CVE-2025-10164 is a remote code execution vulnerability in lmsys sglang 0.4.6 caused by unsafe deserialization in the update_weights_from_tensor funct...
Sep 9, 2025This vulnerability in Android's NotificationChannel component allows local privilege escalation through improper input validation. Attackers can explo...
Sep 4, 2025This critical vulnerability in Aidigu software allows remote attackers to execute arbitrary code through PHP object deserialization in the checkUserCo...
Jul 9, 2025This vulnerability in ESAPI esapi-java-legacy allows SQL injection attacks through the Encoder.encodeForSQL interface due to improper neutralization o...
Jun 29, 2025This critical vulnerability in slackero phpwcms allows remote attackers to execute arbitrary code through deserialization attacks via manipulated imag...
Jun 3, 2025This Spring Security vulnerability allows unauthorized access to /null endpoints when EndpointRequest.to() references disabled or unexposed actuator e...
Apr 28, 2025This CVE describes an insufficient validation vulnerability in PHP's header handling that could allow attackers to manipulate HTTP headers. When user-...
Mar 30, 2025This vulnerability in the Active Products Tables for WooCommerce WordPress plugin allows unauthenticated attackers to call arbitrary WordPress filters...
Mar 26, 2025CVE-2025-2376 is a critical deserialization vulnerability in viames Pair Framework's PHP Object Handler component. Attackers can remotely exploit the ...
Mar 17, 2025This critical vulnerability in Aridius XYZ for OpenCart allows remote attackers to execute arbitrary code through deserialization attacks in the News ...
Jan 29, 2025A critical deserialization vulnerability in AquilaCMS allows remote attackers to execute arbitrary code by manipulating the PostBody.populate paramete...
Jan 14, 2025About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,648 CVEs classified as CWE-20, with 319 rated critical and 1,003 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free