CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,663)
This vulnerability in Intel Graphics Drivers allows authenticated local users to cause denial of service through improper input validation. It affects...
May 13, 2025A vulnerability in Siemens BACnet ATEC 550 series devices allows attackers on the same BACnet network to send specially crafted MSTP messages that cau...
May 13, 2025A vulnerability in Siemens MS/TP Point Pickup Module allows attackers on the same BACnet network to send specially crafted MSTP messages, causing a de...
May 13, 2025This vulnerability allows malicious web content to cause unexpected process crashes in Apple's Safari browser and operating systems. It affects users ...
May 12, 2025An improper input validation vulnerability in Wikimedia's GrowthExperiments MediaWiki extension allows attackers to cause HTTP denial-of-service (DoS)...
Apr 11, 2025This vulnerability in IBM Maximo Application Suite allows authenticated users to perform unauthorized actions due to improper input validation. It aff...
Apr 10, 2025This vulnerability in Google Chrome extensions allows attackers to escalate privileges by tricking users into visiting a malicious webpage. It affects...
Apr 2, 2025This CVE affects Kubernetes clusters using the deprecated in-tree gitRepo volume feature to clone git repositories from other pods on the same node. T...
Mar 13, 2025The wpForo Forum WordPress plugin has an arbitrary file read vulnerability that allows authenticated attackers with subscriber-level access or higher ...
Feb 28, 2025The Uncode WordPress theme has a vulnerability that allows authenticated attackers with Subscriber-level access or higher to read arbitrary files on t...
Feb 18, 2025An improper input validation vulnerability in Schneider Electric products allows attackers to cause denial-of-service by sending malicious ICMPv6 pack...
Feb 13, 2025This vulnerability in Intel Graphics Drivers allows authenticated local users to cause denial of service through improper input validation. It affects...
Feb 12, 2025This vulnerability allows attackers to send specific API requests to BIG-IP Next Central Manager that cause its Kubernetes service to crash, resulting...
Feb 5, 2025This vulnerability in Misskey allows attackers to create fake user profiles that appear to belong to different federated instances, enabling impersona...
Dec 18, 2024This vulnerability in PwnDoc allows authenticated users to crash the backend server by triggering an unhandled promise rejection during audit operatio...
Dec 10, 2024An improper input validation vulnerability in Zoom Apps before version 6.2.0 allows unauthenticated attackers to cause denial of service via network a...
Nov 19, 2024An improper input validation vulnerability in Intel OpenVINO Model Server allows unauthenticated attackers on adjacent networks to cause denial of ser...
Nov 13, 2024This vulnerability in Intel Wireless Bluetooth drivers for Windows allows an unauthenticated attacker within Bluetooth range to potentially cause deni...
Nov 13, 2024This CVE describes an Improper Input Validation vulnerability in Schneider Electric controllers that allows a Man-in-the-Middle attacker to send craft...
Nov 13, 2024This vulnerability in the Windows Mobile Broadband Driver allows an attacker to cause a denial of service (system crash/BSOD) by sending specially cra...
Oct 8, 2024This vulnerability in the Windows Mobile Broadband Driver allows attackers to cause a denial of service (system crash/BSOD) by sending specially craft...
Oct 8, 2024An input validation vulnerability in Rockwell Automation Sequence Manager allows attackers to send malformed packets causing denial-of-service. The de...
Sep 27, 2024CVE-2024-38234 is a Windows networking vulnerability that allows attackers to cause denial of service by sending specially crafted network packets to ...
Sep 10, 2024Ericsson Packet Core Controller (PCC) has an input validation vulnerability in its Access and Mobility Management Function (AMF) that allows attackers...
Aug 20, 2024CVE-2024-7507 is a denial-of-service vulnerability in Rockwell Automation controllers where receiving a malformed PCCC message causes the controller t...
Aug 14, 2024CVE-2024-23669 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands v...
Jun 5, 2024This vulnerability in Microsoft Power BI Client JavaScript SDK allows attackers to disclose sensitive information from affected systems. It affects or...
May 14, 2024This vulnerability in Silicon Labs Gecko SDK Bluetooth LE stack allows an attacker to send a malformed 'prepare write request' command that causes mem...
Mar 28, 2023This vulnerability in TensorFlow allows an attacker with input privileges to provide malicious data to the Convolution3DTranspose function, causing a ...
Mar 27, 2023CVE-2023-28330 is an insufficient input sanitization vulnerability in backup functionality that allows authenticated users with teacher, manager, or a...
Mar 23, 2023A denial of service vulnerability in Microsoft Hyper-V allows an attacker with privileged access on a guest virtual machine to crash the host server b...
Sep 11, 2020This vulnerability in Philips IntelliVue patient monitors allows attackers to cause denial-of-service through system restarts by sending malformed inp...
Sep 11, 2020The elink Embed Content WordPress plugin up to version 1.1.0 allows authenticated attackers with Contributor-level access or higher to inject maliciou...
Aug 15, 2025This vulnerability allows authenticated remote attackers to bypass authorization checks in Cisco SD-WAN vManage's web management interface, potentiall...
Nov 15, 2024This CVE describes a remote deserialization vulnerability in bolo-solo's SnakeYAML component that allows attackers to execute arbitrary code by manipu...
Jan 30, 2026CVE-2026-21690 is a type confusion vulnerability in iccDEV's CIccTagXmlTagData::ToXml() function that could allow memory corruption when processing ma...
Jan 7, 2026This vulnerability in Milvus allows remote attackers to execute arbitrary code through deserialization attacks via the HTTP endpoint. The vulnerabilit...
Jan 5, 2026CVE-2025-15375 is a remote code execution vulnerability in EyouCMS versions up to 1.7.7, caused by insecure deserialization in the arcpagelist handler...
Dec 31, 2025This vulnerability allows remote attackers to execute arbitrary code through deserialization attacks in aizuda snail-job's API component. It affects m...
Dec 30, 2025This vulnerability in Micro Registration Utility (µURU) allows attackers to inject malicious characters into the Dial() application by crafting speci...
Dec 29, 2025CVE-2025-53939 is an improper input validation vulnerability in Kiteworks private data network that allows attackers to elevate another user's permiss...
Nov 29, 2025This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in the shiyi-blog application's job handler comp...
Oct 27, 2025This CVE describes a remote deserialization vulnerability in ILIAS learning management systems. Attackers can exploit the Base64 Decoding Handler's un...
Oct 6, 2025This vulnerability allows remote attackers to execute arbitrary code through deserialization attacks in the ZeroMQ component of GuanxingLu vlarl. It a...
Sep 25, 2025This CVE describes a remote code execution vulnerability in giantspatula SewKinect's /calculate endpoint due to unsafe deserialization via pickle.load...
Sep 25, 2025This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in LazyAGI LazyLLM's lazyllm_call function. Atta...
Sep 25, 2025A remote code execution vulnerability exists in geyang ml-logger's ping handler due to unsafe deserialization of user-controlled data. Attackers can e...
Sep 25, 2025This vulnerability in jeecgboot JimuReport allows remote attackers to execute arbitrary code through deserialization attacks via the DB2 JDBC Handler ...
Sep 21, 2025This vulnerability allows remote attackers to exploit a deserialization flaw in jeecgboot JimuReport's MySQL JDBC handler. Attackers can execute arbit...
Sep 21, 2025This vulnerability in h2oai h2o-3 allows remote attackers to execute arbitrary code through deserialization attacks via the H2 JDBC Driver's connectio...
Sep 21, 2025About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,663 CVEs classified as CWE-20, with 321 rated critical and 1,017 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free