Direct Vulnerabilities

Known vulnerabilities in the skopeo package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Excessive Platform Resource Consumption within a Loop

*
  • M
Cross-site Scripting (XSS)

*
  • M
Cross-site Scripting (XSS)

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Out-of-bounds Read

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Incorrect Calculation of Buffer Size

*
  • H
Improper Certificate Validation

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Improper Validation of Syntactic Correctness of Input

*
  • H
Allocation of Resources Without Limits or Throttling

<2:1.20.0-3.el10_1
  • M
CVE-2025-68121

<2:1.20.0-3.el10_1
  • H
Excessive Platform Resource Consumption within a Loop

<2:1.20.0-3.el10_1
  • M
Directory Traversal

*
  • M
Directory Traversal

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
NULL Pointer Dereference

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Server-Side Request Forgery (SSRF)

*
  • M
Allocation of Resources Without Limits or Throttling

<2:1.20.0-2.el10_1
  • M
Allocation of Resources Without Limits or Throttling

<2:1.18.1-3.el10_0
  • M
Improper Certificate Validation

*
  • M
Improper Certificate Validation

*
  • M
Resource Exhaustion

*
  • M
Reachable Assertion

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Creation of Immutable Text Using String Concatenation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Improper Output Neutralization for Logs

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Expected Behavior Violation

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Allocation of Resources Without Limits or Throttling

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • M
CVE-2025-4673

*
  • M
CVE-2025-4673

*
  • M
HTTP Request Smuggling

<2:1.18.1-2.el10_0
  • H
Uncontrolled Recursion

*
  • L
Improper Verification of Cryptographic Signature

*
  • M
Improper Input Validation

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Information Exposure

*
  • M
Allocation of Resources Without Limits or Throttling

<2:1.18.1-1.el10_0
  • L
Improper Verification of Cryptographic Signature

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Missing Release of Resource after Effective Lifetime

*
  • M
Buffer Overflow

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Resource Exhaustion

*
  • M
Resource Exhaustion

*
  • M
Use of Uninitialized Variable

*
  • M
Directory Traversal

*
  • L
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
Integer Overflow or Wraparound

*
  • M
Information Exposure

*
  • M
Resource Exhaustion

*
  • M
Insufficiently Protected Credentials

*
  • M
HTTP Request Smuggling

*
  • M
Incorrect Calculation

*