Ruby/devise/1.5.3


Flexible authentication solution for Rails with Warden

https://rubygems.org/gems/devise
UNKNOWN

8 Security Vulnerabilities

devise Time-of-check Time-of-use Race Condition vulnerability

Published date: 2019-03-19T18:03:25Z
CVE: CVE-2019-5421
Links:

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Affected versions: ["4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Unauthorized Access Using "Remember Me" Cookie

Published date: 2023-01-26T23:54:07Z
CVE: CVE-2015-8314
Links:

Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Affected versions: ["3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Authentication Bypass in Devise

Published date: 2019-09-11T23:06:57Z
CVE: CVE-2019-16109
Links:

An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmationtoken column. (However, there is no scenario within Devise itself in which such database records would exist.)

Affected versions: ["4.7.0", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise does not properly perform type conversion when performing database queries

Published date: 2017-10-24T18:33:37Z
CVE: CVE-2013-0233
Links:

Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.

Affected versions: ["1.5.3", "1.5.2", "1.5.1", "1.5.0", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.1.2", "2.1.0", "2.2.2", "2.2.1", "2.2.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie

Published date: 2016-01-18
CVE: 2015-8314
CVSS V3: 7.5
Links:

Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Affected versions: ["3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby confirmation token validation with a blank string

Published date: 2019-09-08
CVE: 2019-16109
CVSS V3: 5.3
Links:

Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmationtoken column. However, there is no scenario within Devise itself in which such database records would exist.

Affected versions: ["4.7.0", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable module

Published date: 2019-02-07
CVE: 2019-5421
CVSS V2: 7.5
CVSS V3: 9.8
Links:

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Affected versions: ["4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

CSRF token fixation attacks in Devise

Published date: 2013-08-02
Links:

Devise contains a flaw that allows a remote, user-assisted attacker to conduct a CSRF token fixation attack. This issue is triggered as previous CSRF tokens are not properly invalidated when a new token is created. If an attacker has knowledge of said token, a specially crafted request can be made to it, allowing the attacker to conduct CSRF attacks.

Affected versions: ["3.0.0", "3.0.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

167 Other Versions

Version License Security Released
1.2.1 UNKNOWN 8 2011-03-28 - 18:52 about 13 years
1.2.0 UNKNOWN 8 2011-03-25 - 14:56 about 13 years
1.2.rc2 UNKNOWN 8 2011-03-11 - 19:57 about 13 years
1.2.rc UNKNOWN 8 2010-11-26 - 11:30 over 13 years
1.1.9 UNKNOWN 8 2011-03-25 - 14:52 about 13 years
1.1.8 UNKNOWN 8 2011-03-11 - 20:23 about 13 years
1.1.7 UNKNOWN 8 2011-02-16 - 20:04 about 13 years
1.1.6 UNKNOWN 8 2011-02-15 - 10:19 about 13 years
1.1.5 UNKNOWN 8 2010-11-27 - 20:53 over 13 years
1.1.4 UNKNOWN 8 2010-11-26 - 12:18 over 13 years
1.1.3 UNKNOWN 8 2010-09-24 - 07:39 over 13 years
1.1.2 UNKNOWN 8 2010-08-25 - 11:45 over 13 years
1.1.1 UNKNOWN 8 2010-07-27 - 14:29 almost 14 years
1.1.0 UNKNOWN 8 2010-07-26 - 18:25 almost 14 years
1.1.pre4 UNKNOWN 8 2010-03-03 - 11:22 about 14 years
1.1.pre3 UNKNOWN 8 2010-02-24 - 21:20 about 14 years
1.1.pre2 UNKNOWN 8 2010-02-18 - 17:06 about 14 years
1.1.pre UNKNOWN 8 2010-02-17 - 12:57 about 14 years
1.1.rc2 UNKNOWN 8 2010-06-23 - 10:39 almost 14 years
1.1.rc1 UNKNOWN 8 2010-04-15 - 06:45 about 14 years
1.1.rc0 UNKNOWN 8 2010-04-03 - 11:20 about 14 years
1.0.11 UNKNOWN 8 2011-03-11 - 20:45 about 13 years
1.0.10 UNKNOWN 8 2011-02-15 - 19:27 about 13 years
1.0.9 UNKNOWN 8 2010-11-26 - 12:26 over 13 years
1.0.8 UNKNOWN 8 2010-06-23 - 10:22 almost 14 years
1.0.7 UNKNOWN 8 2010-05-03 - 11:58 about 14 years
1.0.6 UNKNOWN 8 2010-04-03 - 11:25 about 14 years
1.0.5 UNKNOWN 8 2010-03-26 - 12:04 about 14 years
1.0.4 UNKNOWN 8 2010-03-03 - 11:24 about 14 years
1.0.3 UNKNOWN 8 2010-02-23 - 14:45 about 14 years
1.0.2 UNKNOWN 8 2010-02-17 - 20:32 about 14 years
1.0.1 UNKNOWN 8 2010-02-15 - 13:19 about 14 years
1.0.0 UNKNOWN 8 2010-02-09 - 01:17 over 14 years
0.9.2 UNKNOWN 8 2010-02-05 - 20:37 over 14 years
0.9.1 UNKNOWN 8 2010-01-25 - 19:22 over 14 years
0.9.0 UNKNOWN 8 2010-01-21 - 14:31 over 14 years
0.8.2 UNKNOWN 8 2010-01-13 - 16:47 over 14 years
0.8.1 UNKNOWN 8 2010-01-08 - 22:27 over 14 years
0.8.0 UNKNOWN 8 2010-01-07 - 21:50 over 14 years
0.7.5 UNKNOWN 8 2010-01-02 - 09:12 over 14 years
0.7.4 UNKNOWN 8 2009-12-22 - 21:05 over 14 years
0.7.3 UNKNOWN 8 2009-12-16 - 00:29 over 14 years
0.7.2 UNKNOWN 8 2009-12-15 - 00:05 over 14 years
0.7.1 UNKNOWN 8 2009-12-08 - 22:40 over 14 years
0.7.0 UNKNOWN 8 2009-12-07 - 23:00 over 14 years
0.6.3 UNKNOWN 8 2009-12-02 - 18:41 over 14 years
0.6.2 UNKNOWN 8 2009-11-25 - 01:20 over 14 years
0.6.1 UNKNOWN 8 2009-11-24 - 02:09 over 14 years
0.6.0 UNKNOWN 8 2009-11-23 - 01:23 over 14 years
0.5.6 UNKNOWN 8 2009-11-21 - 22:08 over 14 years
0.5.5 UNKNOWN 8 2009-11-19 - 22:55 over 14 years
0.5.4 UNKNOWN 8 2009-11-19 - 15:14 over 14 years
0.5.3 UNKNOWN 8 2009-11-18 - 11:48 over 14 years
0.5.2 UNKNOWN 8 2009-11-17 - 19:39 over 14 years
0.5.1 UNKNOWN 8 2009-11-15 - 20:15 over 14 years
0.5.0 UNKNOWN 8 2009-11-14 - 02:01 over 14 years
0.4.3 UNKNOWN 8 2009-11-10 - 03:01 over 14 years
0.4.2 UNKNOWN 8 2009-11-06 - 20:01 over 14 years
0.4.1 UNKNOWN 8 2009-11-04 - 03:34 over 14 years
0.4.0 UNKNOWN 8 2009-11-03 - 16:29 over 14 years
0.3.0 UNKNOWN 8 2009-10-30 - 13:43 over 14 years
0.2.3 UNKNOWN 8 2009-10-29 - 18:10 over 14 years
0.2.2 UNKNOWN 8 2009-10-28 - 13:33 over 14 years
0.2.1 UNKNOWN 8 2009-10-28 - 03:12 over 14 years
0.2.0 UNKNOWN 8 2009-10-25 - 01:45 over 14 years
0.1.1 UNKNOWN 8 2009-10-21 - 20:07 over 14 years
0.1.0 UNKNOWN 8 2009-10-21 - 05:34 over 14 years