This document discusses weaknesses in data normalization that can lead to vulnerabilities. It covers issues at various levels including protocol (e.g. double URL encoding bypassing validation), filesystem (e.g. path traversal using unusual encodings), databases (e.g. truncation or encoding issues), and applications (e.g. bypassing input sanitization with multibyte encodings). The key message is that input validation needs to consider challenges across all these levels from protocols to storage to properly prevent attacks exploiting normalization weaknesses.