remix-auth-auth0 vulnerabilities

The Auth0 strategy is used to authenticate users against an Auth0 account. It extends the OAuth2Strategy.

Package versions

27 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
2.2.03 Apr, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
2.1.01 Apr, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
2.0.020 Mar, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.10.014 Feb, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.9.024 Oct, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.8.219 Oct, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.8.117 Oct, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.8.017 Oct, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.7.020 Mar, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.6.021 Feb, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.5.110 Dec, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.5.010 Dec, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.4.123 Oct, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.4.012 Sep, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.827 Jul, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.711 May, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.614 Apr, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.525 Mar, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.48 Mar, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.34 Mar, 2022
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Get started free