Skip to content
View ooooooo-q's full-sized avatar
🖥️
コードを読む
🖥️
コードを読む

Organizations

@niigata-js

Block or report ooooooo-q

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned Loading

  1. これまで報告した脆弱性の中でCVEが割り当てられたもの一覧
    1
    - 2024
    2
      - CVE-2024-47888 
    3
        - Rails
    4
        - [\[CVE-2024-47888\] Possible ReDoS vulnerability in plain_text_for_blockquote_node in Action Text](https://discuss.rubyonrails.org/t/cve-2024-47888-possible-redos-vulnerability-in-plain-text-for-blockquote-node-in-action-text/87696)
    5
      - CVE-2024-32464
  2. deserialization_on_rails_code Public

    Ruby

  3. public_zenn_articles Public

    1 1

49 contributions in the last year

Contribution Graph
Day of Week March April May June July August September October November December January February March
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Less
No contributions.
Low contributions.
Medium-low contributions.
Medium-high contributions.
High contributions.
More

Activity overview

Loading A graph representing ooooooo-q's contributions from March 24, 2024 to March 26, 2025. The contributions are 94% commits, 4% issues, 2% pull requests, 0% code review.

Contribution activity

March 2025

ooooooo-q has no activity yet for this period.
Loading