skopeo vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the skopeo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Allocation of Resources Without Limits or Throttling

<2:1.20.0-3.el10_1
  • M
CVE-2025-68121

<2:1.20.0-3.el10_1
  • H
Excessive Platform Resource Consumption within a Loop

<2:1.20.0-3.el10_1
  • M
CVE-2025-68121

*
  • M
Directory Traversal

*
  • H
Allocation of Resources Without Limits or Throttling

*
  • M
Directory Traversal

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
NULL Pointer Dereference

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • H
Excessive Platform Resource Consumption within a Loop

*
  • M
Allocation of Resources Without Limits or Throttling

<2:1.20.0-2.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<2:1.18.1-3.el10_0
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Resource Exhaustion

*
  • M
Reachable Assertion

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
CVE-2025-4673

*
  • M
HTTP Request Smuggling

<2:1.18.1-2.el10_0
  • H
Uncontrolled Recursion

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

<2:1.18.1-1.el10_0
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Buffer Overflow

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use of Uninitialized Variable

*
  • M
Directory Traversal

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Insufficiently Protected Credentials

*
  • M
HTTP Request Smuggling

*
  • M
Incorrect Calculation

*