UseExpressJS Profile Banner
ExpressJS Profile
ExpressJS

@UseExpressJS

Followers
9K
Following
163
Media
2
Statuses
118

ExpressJS - The Node.js Web Server Framework

npm i express
Joined December 2019
Don't wanna be here? Send us removal request.
@UseExpressJS
ExpressJS
6 years
🎉🎉🎉 Express has a Twitter 🎉🎉🎉 Tell your friends! Follow @UseExpressJS for news and updates.
15
174
435
@bjohansebas
Sebastian Beltran
5 months
@UseExpressJS has just created a performance group. Join the conversations that will be happening to make Express faster than ever. https://t.co/7RkA0sLnNh #expressjs #opensource #perfomance
Tweet card summary image
github.com
Performance Working Group. Contribute to expressjs/perf-wg development by creating an account on GitHub.
0
3
9
@kom_256
Ulises Gascón
6 months
📦 #Express 5.1.0 is out! ✅ v5 is now the default on #npm 🛠️ New #codemod for easy migration from v4 📅 #LTS timeline announced (including v4 EOL) Big step for @UseExpressJS 👏👏👏 👉
Tweet card summary image
expressjs.com
Express 5.1.0 is now the default on npm, and we're introducing an official LTS schedule for the v4 and v5 release lines.
0
7
32
@UseExpressJS
ExpressJS
6 months
Better late than never! 🫡
@fastifyjs
Fastify
1 year
@UseExpressJS is now your turn!
1
0
22
@UseExpressJS
ExpressJS
6 months
🚀 Exciting Announcement today! Express v5 is officially "latest" and we have started the maintenance period for v4. Read more about the release and our LTS plans in our blog post:
Tweet card summary image
expressjs.com
Express 5.1.0 is now the default on npm, and we're introducing an official LTS schedule for the v4 and v5 release lines.
3
28
110
@kom_256
Ulises Gascón
8 months
🚀 2024 was monumental for @UseExpressJS: ✅ Released Express 5.0 ✅ Overhauled governance ✅ Strengthened security (audits, triage team…) 2025? Even bigger: ✨ Automated npm releases ✨ Scoped packages ✨ Performance monitoring ✨ Enhanced security https://t.co/EmgHK7WENl
Tweet card summary image
expressjs.com
Explore the transformative journey of Express.js in 2024, marked by governance improvements, the long-awaited release of Express 5.0, and heightened security measures. Look into the ambitious plans...
0
6
19
@sanity_io
Sanity
10 months
@UseExpressJS We don't just like it, we depend on it! 🙇
1
1
11
@UseExpressJS
ExpressJS
10 months
Thanks a lot @sanity_io for your financial contribution to Express on Open Collective https://t.co/yQ7MfGMRMk 🎉 We are glad that you like and support Express!
Tweet card summary image
opencollective.com
Express.js is a minimal and flexible Node.js web application framework, offering a robust set of features for building web applications.
2
2
33
@NodeSource
NodeSource
11 months
CityJS Medellín just started and it’s going great 🤩 @wesleytodd and @_rafaelgss talking about #express and #nodejs permission model 👏👏👏
Tweet media one
Tweet media two
0
8
23
@kmorope
Camilo Romero
11 months
@wesleytodd Express still rocks 🤘, OSS projects need more funding💸, awesome talk @CityJSMedellin
Tweet media one
0
6
10
@kom_256
Ulises Gascón
1 year
🔒 The September 2024 Security Release Report for the #Express (@UseExpressJS) ecosystem is now live. We have patched: 👉 2 High severity 👉 4 Medium severity ⬆️ Please upgrade and use the latest versions. Check all the details:
Tweet card summary image
expressjs.com
Security releases for Express, body-parser, send, serve-static, and path-to-regexp have been published. We recommend that all users upgrade as soon as possible.
1
6
22
@kom_256
Ulises Gascón
11 months
Introducing #Express v5: A New Era for #Nodejs Framework 🛸 👾 The official blog post is here! https://t.co/7PDkRj6VWP
Tweet card summary image
expressjs.com
Announcing the release of Express version 5
16
146
850
@edsadr
ॐ Adrián Estrada
1 year
Something for the entire @nodejs ecosystem to celebrate... @UseExpressJS finally released 5.0... has been a journey for the project.... the new team behind it is amazing, Thanks for all the hard work there, @wesleytodd
@wesleytodd
Wes
1 year
that purple merged label feels really good right now.
1
3
14
@edsadr
ॐ Adrián Estrada
1 year
Unsung hero, which I am very honored to work with... Everyone, let's also thank @kom_256 , @UseExpressJS the most used framework in the @nodejs ecosystem, is healty and alive... the future looks bright...
@kom_256
Ulises Gascón
1 year
🛡️🔒 | The Security Triage team from @useexpressjs has released patches for several vulnerabilities. In this thread, you can find all the details:👇 #Security #Express #Patches
0
5
12
@kom_256
Ulises Gascón
1 year
CVE-2024-43800 (moderate) in Serve-static passing untrusted user input - even after sanitizing it - to redirect() may execute untrusted code https://t.co/qV6C8dQ5Pz
Tweet card summary image
github.com
### Impact passing untrusted user input - even after sanitizing it - to `redirect()` may execute untrusted code ### Patches this issue is patched in serve-static 1.16.0 ### Workarounds ...
1
1
3
@kom_256
Ulises Gascón
1 year
CVE-2024-43799 (moderate) in Send. passing untrusted user input - even after sanitizing it - to SendStream.redirect() may execute untrusted code https://t.co/70UVcxfy5W
Tweet card summary image
github.com
### Impact passing untrusted user input - even after sanitizing it - to `SendStream.redirect()` may execute untrusted code ### Patches this issue is patched in send 0.19.0 ### Workaroun...
1
2
4
@kom_256
Ulises Gascón
1 year
CVE-2024-43796 (moderate) in Express. In express <4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code https://t.co/w6ke5GZtHr
Tweet card summary image
github.com
### Impact In express <4.20.0, passing untrusted user input - even after sanitizing it - to `response.redirect()` may execute untrusted code ### Patches this issue is patched in express...
1
1
4
@kom_256
Ulises Gascón
1 year
CVE-2024-45590 (High) in body-parser body-parser <1.20.3 is vulnerable to DOS when url encoding is enabled. a malicious actor using a specially crafted payload could flood the server with a large number of requests, resulting in denial of service. https://t.co/9VcjDzMGvT
Tweet card summary image
github.com
### Impact body-parser <1.20.3 is vulnerable to denial of service when url encoding is enabled. a malicious actor using a specially crafted payload could flood the server with a large number...
1
1
5