UseExpressJS's profile picture. ExpressJS - The Node.js Web Server Framework

ExpressJS

@UseExpressJS

ExpressJS - The Node.js Web Server Framework

مثبتة

🎉🎉🎉 Express has a Twitter 🎉🎉🎉 Tell your friends! Follow @UseExpressJS for news and updates.


ExpressJS أعاد

@UseExpressJS has just created a performance group. Join the conversations that will be happening to make Express faster than ever. github.com/expressjs/perf… #expressjs #opensource #perfomance


ExpressJS أعاد

📦 #Express 5.1.0 is out! ✅ v5 is now the default on #npm 🛠️ New #codemod for easy migration from v4 📅 #LTS timeline announced (including v4 EOL) Big step for @UseExpressJS 👏👏👏 👉 expressjs.com/2025/03/31/v5-…


Better late than never! 🫡


🚀 Exciting Announcement today! Express v5 is officially "latest" and we have started the maintenance period for v4. Read more about the release and our LTS plans in our blog post: expressjs.com/2025/03/31/v5-…


ExpressJS أعاد

🚀 2024 was monumental for @UseExpressJS: ✅ Released Express 5.0 ✅ Overhauled governance ✅ Strengthened security (audits, triage team…) 2025? Even bigger: ✨ Automated npm releases ✨ Scoped packages ✨ Performance monitoring ✨ Enhanced security expressjs.com/2025/01/09/rew…


ExpressJS أعاد

We don't just like it, we depend on it! 🙇


Thanks a lot @sanity_io for your financial contribution to Express on Open Collective opencollective.com/express 🎉 We are glad that you like and support Express!


ExpressJS أعاد

CityJS Medellín just started and it’s going great 🤩 @wesleytodd and @_rafaelgss talking about #express and #nodejs permission model 👏👏👏

NodeSource's tweet image. CityJS Medellín just started and it’s going great 🤩 @wesleytodd and @_rafaelgss talking about #express and #nodejs permission model 👏👏👏
NodeSource's tweet image. CityJS Medellín just started and it’s going great 🤩 @wesleytodd and @_rafaelgss talking about #express and #nodejs permission model 👏👏👏

ExpressJS أعاد

@wesleytodd Express still rocks 🤘, OSS projects need more funding💸, awesome talk @CityJSMedellin

kmorope's tweet image. @wesleytodd Express still rocks 🤘, OSS projects need more funding💸, awesome talk @CityJSMedellin

ExpressJS أعاد

🔒 The September 2024 Security Release Report for the #Express (@UseExpressJS) ecosystem is now live. We have patched: 👉 2 High severity 👉 4 Medium severity ⬆️ Please upgrade and use the latest versions. Check all the details: expressjs.com/2024/09/29/sec…


ExpressJS أعاد

Introducing #Express v5: A New Era for #Nodejs Framework 🛸 👾 The official blog post is here! expressjs.com/2024/10/15/v5-…


ExpressJS أعاد

❤️ Love #OpenSource? You can fuel my work for the #JS ecosystem (#Node, #Express, and more) with just one click! 👇 github.com/sponsors/Ulise…


ExpressJS أعاد

Something for the entire @nodejs ecosystem to celebrate... @UseExpressJS finally released 5.0... has been a journey for the project.... the new team behind it is amazing, Thanks for all the hard work there, @wesleytodd


ExpressJS أعاد

Unsung hero, which I am very honored to work with... Everyone, let's also thank @kom_256 , @UseExpressJS the most used framework in the @nodejs ecosystem, is healty and alive... the future looks bright...

🛡️🔒 | The Security Triage team from @useexpressjs has released patches for several vulnerabilities. In this thread, you can find all the details:👇 #Security #Express #Patches



ExpressJS أعاد

CVE-2024-43800 (moderate) in Serve-static passing untrusted user input - even after sanitizing it - to redirect() may execute untrusted code github.com/expressjs/serv…


ExpressJS أعاد

CVE-2024-43799 (moderate) in Send. passing untrusted user input - even after sanitizing it - to SendStream.redirect() may execute untrusted code github.com/pillarjs/send/…


ExpressJS أعاد

CVE-2024-43796 (moderate) in Express. In express <4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code github.com/expressjs/expr…


ExpressJS أعاد

CVE-2024-45590 (High) in body-parser body-parser <1.20.3 is vulnerable to DOS when url encoding is enabled. a malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. github.com/expressjs/body…


Loading...

Something went wrong.


Something went wrong.