CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,659
Total CVEs
321
Critical
1,013
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 84
3 Cisco 72
4 Intel 62
5 Qualcomm 49
6 Apache 47
7 Adobe 42
8 Huawei 42
9 Apple 40
10 Color 40

All Improper Input Validation CVEs (1,659)

CVE-2026-21684
7.1

This vulnerability involves undefined behavior in the CIccTagSpectralViewingConditions() function of the iccDEV library, which could lead to crashes, ...

Jan 7, 2026
CVE-2026-21685
7.1

This vulnerability involves undefined behavior in the CIccTagLut16::Read() function of the iccDEV library, which could lead to memory corruption when ...

Jan 7, 2026
CVE-2026-21686
7.1

This vulnerability involves undefined behavior in the CIccTagLutAtoB::Validate() function of the iccDEV library, which could lead to crashes, memory c...

Jan 7, 2026
CVE-2026-21687
7.1

CVE-2026-21687 is an undefined behavior vulnerability in the CIccTagCurve constructor of the iccDEV library that processes ICC color profiles. This co...

Jan 7, 2026
CVE-2026-21681
7.1

CVE-2026-21681 is an undefined behavior runtime error in iccDEV library versions before 2.3.1.2 that could lead to crashes or potentially arbitrary co...

Jan 7, 2026
CVE-2025-61084
7.1

MDaemon Mail Server 23.5.2 has an email spoofing vulnerability where attackers can use invisible Unicode thin spaces in the From: header to display a ...

Nov 5, 2025
CVE-2025-48537
7.1

This CVE describes an improper input validation vulnerability in Android that allows local denial-of-service attacks without user interaction. It coul...

Sep 4, 2025
CVE-2025-29646
7.1

A vulnerability in open5gs upf component allows remote attackers to cause denial of service by sending specially crafted PFCP SessionEstablishmentRequ...

Jun 18, 2025
CVE-2025-30355
7.1

A malicious Matrix server can craft events that cause Synapse homeservers to stop federating with other servers when received. This denial-of-service ...

Mar 27, 2025
CVE-2025-21194
7.1

This vulnerability allows attackers to bypass security features on Microsoft Surface devices, potentially gaining unauthorized access or privileges. I...

Feb 11, 2025
CVE-2024-9875
7.1

This CVE describes a privilege escalation vulnerability in Okta Privileged Access server agent (SFTD) when the sudo command bundles feature is enabled...

Nov 21, 2024
CVE-2024-20659
7.1

This vulnerability allows attackers to bypass security features in Windows Hyper-V, potentially enabling unauthorized access or privilege escalation w...

Oct 8, 2024
CVE-2024-23362
7.1

This vulnerability involves a cryptographic issue in RSA key parsing in COBR format, potentially allowing attackers to bypass cryptographic protection...

Sep 2, 2024
CVE-2024-27240
7.1

This vulnerability allows authenticated Windows users with local access to escalate privileges through improper input validation in Zoom Apps installe...

Jul 15, 2024
CVE-2024-25743
7.1

This vulnerability allows an untrusted hypervisor to inject virtual interrupts 0 and 14 at any time, triggering SIGFPE signal handlers in userspace ap...

May 15, 2024
CVE-2024-30916
7.1

A vulnerability in eProsima FastDDS versions 2.14.0 and earlier allows local attackers to cause denial of service and potentially leak sensitive infor...

Apr 11, 2024
CVE-2023-51747
7.1

This SMTP smuggling vulnerability in Apache James allows attackers to manipulate email line delimiters to forge SMTP envelopes, potentially bypassing ...

Feb 27, 2024
CVE-2024-1714
7.1

This vulnerability in SailPoint IdentityIQ allows authenticated users to request access to entitlements with leading or trailing whitespace in their v...

Feb 21, 2024
CVE-2024-0396
7.1

This CVE describes an input validation vulnerability in Progress MOVEit Transfer that allows authenticated users to manipulate HTTPS transaction param...

Jan 17, 2024
CVE-2023-36860
7.1

This vulnerability in Intel Unison software allows authenticated users with network access to potentially escalate privileges through improper input v...

Nov 14, 2023
CVE-2022-33190
7.1

This vulnerability in Intel(R) SUR software allows authenticated users with local access to potentially escalate privileges through improper input val...

Feb 16, 2023
CVE-2021-26370
7.1

This AMD firmware vulnerability allows attackers with local access to overwrite bootloader memory by exploiting improper address validation in SVC_LOA...

May 10, 2022
CVE-2021-30278
7.1

This vulnerability in Qualcomm's TrustZone memory transfer interface allows improper input validation that could lead to information disclosure. It af...

Jan 3, 2022
CVE-2021-3583
7.1

CVE-2021-3583 is a template injection vulnerability in Ansible that allows attackers to execute arbitrary commands through specially crafted facts in ...

Sep 22, 2021
CVE-2021-25410
7.1

This vulnerability in Samsung's CallBGProvider component allows local attackers to bypass access controls and read arbitrary files with elevated privi...

Jun 11, 2021
CVE-2021-25356
7.1

CVE-2021-25356 is an improper caller check vulnerability in Samsung's Managed Provisioning service that allows unprivileged applications to install ar...

Apr 9, 2021
CVE-2020-29075
7.1

This vulnerability in Adobe Acrobat Reader DC allows attackers to trigger DNS queries when users open PDF files from their local filesystem, enabling ...

Feb 23, 2021
CVE-2019-14038
7.1

This CVE describes a buffer over-read vulnerability in the ADSP parse function of Qualcomm Snapdragon chipsets. It allows attackers to read beyond all...

Jun 2, 2020
CVE-2020-12487
7.0

CVE-2020-12487 is a command injection vulnerability in Vivo ABE service that allows attackers to execute arbitrary commands with root privileges. This...

Dec 17, 2024
CVE-2024-31449
7.0

This vulnerability allows authenticated Redis users to trigger a stack buffer overflow via specially crafted Lua scripts, potentially leading to remot...

Oct 7, 2024
CVE-2024-6376
7.0

MongoDB Compass versions before 1.42.2 have insufficient sandbox protection in the ejson shell parser used for connection handling, allowing potential...

Jul 1, 2024
CVE-2024-23482
7.0

This CVE describes a local privilege escalation vulnerability in ZScaler's ZScalerService process on macOS. An attacker with local access can exploit ...

Mar 26, 2024
CVE-2020-7862
7.0

This vulnerability in HelpU remote control solution allows authenticated remote attackers to execute arbitrary commands on affected systems due to ins...

Jun 24, 2021
CVE-2020-15170
7.0

CVE-2020-15170 is an access control vulnerability in Apollo AdminService that allows unauthenticated attackers to directly access administrative APIs....

Sep 10, 2020
CVE-2026-20020
6.8

A buffer overflow vulnerability in Cisco ASA and FTD firewall OSPF protocol allows adjacent attackers to cause device reloads and denial-of-service. A...

Mar 4, 2026
CVE-2025-15545
6.8

CVE-2025-15545 is a command injection vulnerability in TP-Link RE605X v3 backup restore function that allows attackers to execute arbitrary commands w...

Jan 29, 2026
CVE-2026-23571
6.8

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with actioner privilege to execute arbitrary comm...

Jan 29, 2026
CVE-2025-65397
6.8

This vulnerability allows attackers with physical access to Blurams Flare Camera devices to execute arbitrary commands with root privileges by placing...

Jan 14, 2026
CVE-2025-64991
6.8

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...

Dec 11, 2025
CVE-2025-64992
6.8

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...

Dec 11, 2025
CVE-2025-64993
6.8

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...

Dec 11, 2025
CVE-2025-64990
6.8

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...

Dec 11, 2025
CVE-2023-21472
6.8

This vulnerability allows a physical attacker with USB access to execute arbitrary code in the bootloader of Samsung Exynos devices due to improper in...

Sep 3, 2025
CVE-2023-21473
6.8

This vulnerability allows a physical attacker with USB access to execute arbitrary code in the bootloader of Samsung devices with Exynos chipsets. It ...

Sep 3, 2025
CVE-2025-30293
6.8

This CVE describes an Improper Input Validation vulnerability in Adobe ColdFusion that allows high-privileged attackers to bypass security protections...

Apr 8, 2025
CVE-2024-49073
6.8

This vulnerability in the Windows Mobile Broadband Driver allows an authenticated attacker to execute arbitrary code with SYSTEM privileges by exploit...

Dec 12, 2024
CVE-2024-22065
6.8

This CVE describes a command injection vulnerability in ZTE MF258 Pro mobile hotspot devices. An authenticated attacker can exploit insufficient param...

Oct 29, 2024
CVE-2024-43525
6.8

This vulnerability in the Windows Mobile Broadband Driver allows an attacker to execute arbitrary code remotely on affected systems. Attackers could e...

Oct 8, 2024
CVE-2024-43523
6.8

This vulnerability in the Windows Mobile Broadband Driver allows attackers to execute arbitrary code remotely on affected systems. It affects Windows ...

Oct 8, 2024
CVE-2024-25008
6.8

Ericsson RAN Compute and Site Controller 6610 has an input validation vulnerability in its Control System that allows authenticated attackers with sys...

Aug 16, 2024

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,659 CVEs classified as CWE-20, with 321 rated critical and 1,013 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free