Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

expressjs — Vulnerabilities & Security Advisories 13

Browse all 13 CVE security advisories affecting expressjs. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Express.js serves as a minimal and flexible Node.js web application framework for building server-side applications and APIs. Historically, it has been susceptible to common web vulnerabilities including Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation, often stemming from middleware misconfigurations or input validation flaws. The framework's extensive middleware ecosystem has introduced security challenges, with 13 CVEs documented to date. Notable incidents include the 2018 "prototype pollution" vulnerability affecting multiple packages, demonstrating how core functionality can be compromised. While widely adopted, developers must carefully implement security measures to mitigate risks associated with its lightweight architecture and extensive plugin ecosystem.

Found 1 results / 13Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-45590 body-parser vulnerable to denial of service when url encoding is enabled — body-parserCWE-405 7.5 High2024-09-10

This page lists every published CVE security advisory associated with expressjs. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.