From 3c6dd019d23ef35ce2eadfbb8ec2e8fa03501baa Mon Sep 17 00:00:00 2001 From: Codex Date: Mon, 20 Apr 2026 10:53:05 +0800 Subject: [PATCH] docs: fix wording typo in security updates note --- en/advanced/security-updates.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/en/advanced/security-updates.md b/en/advanced/security-updates.md index d6d20dd6e4..3d55467b66 100755 --- a/en/advanced/security-updates.md +++ b/en/advanced/security-updates.md @@ -33,7 +33,7 @@ If you believe you have discovered a security vulnerability in Express, please s * The dependency `serve-static` has been updated to address a [vulnerability](https://github.com/advisories/GHSA-cm22-4g7w-348p). * The dependency `send` has been updated to address a [vulnerability](https://github.com/advisories/GHSA-m6fv-jmcg-4jfg). * The dependency `path-to-regexp` has been updated to address a [vulnerability](https://github.com/pillarjs/path-to-regexp/security/advisories/GHSA-9wv6-86v2-598j). - * The dependency `body-parser` has been updated to addres a [vulnerability](https://github.com/advisories/GHSA-qwcr-r2fm-qrc7), This may affect your application if you had url enconding activated. + * The dependency `body-parser` has been updated to address a [vulnerability](https://github.com/advisories/GHSA-qwcr-r2fm-qrc7), This may affect your application if you had URL encoding activated. * 4.19.0, 4.19.1 * Fixed open redirect vulnerability in `res.location` and `res.redirect` ([advisory](https://github.com/expressjs/express/security/advisories/GHSA-rv95-896h-c2vc), [CVE-2024-29041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29041)). * 4.17.3 @@ -83,4 +83,4 @@ If you believe you have discovered a security vulnerability in Express, please s * Sparse arrays that have extremely high indexes in query string could cause the process to run out of memory and crash the server. * Extremely nested query string objects could cause the process to block and make the server unresponsive temporarily. * 3.3.0 - * The 404 response of an unsupported method override attempt was susceptible to cross-site scripting attacks. \ No newline at end of file + * The 404 response of an unsupported method override attempt was susceptible to cross-site scripting attacks.