skopeo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the skopeo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Directory Traversal

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • H
Link Following

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
CVE-2025-4673

*
  • M
HTTP Request Smuggling

<2:1.18.1-2.el10_0
  • H
Uncontrolled Recursion

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

<2:1.18.1-1.el10_0
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Buffer Overflow

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use of Uninitialized Variable

*
  • M
Directory Traversal

*
  • L
Resource Exhaustion

*
  • M
Integer Overflow or Wraparound

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Insufficiently Protected Credentials

*
  • M
HTTP Request Smuggling

*
  • M
Incorrect Calculation

*