Ruby/devise/2.0.0


Flexible authentication solution for Rails with Warden

https://rubygems.org/gems/devise
UNKNOWN

8 Security Vulnerabilities

devise Time-of-check Time-of-use Race Condition vulnerability

Published date: 2019-03-19T18:03:25Z
CVE: CVE-2019-5421
Links:

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Affected versions: ["4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Unauthorized Access Using "Remember Me" Cookie

Published date: 2023-01-26T23:54:07Z
CVE: CVE-2015-8314
Links:

Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Affected versions: ["3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Authentication Bypass in Devise

Published date: 2019-09-11T23:06:57Z
CVE: CVE-2019-16109
Links:

An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmationtoken column. (However, there is no scenario within Devise itself in which such database records would exist.)

Affected versions: ["4.7.0", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise does not properly perform type conversion when performing database queries

Published date: 2017-10-24T18:33:37Z
CVE: CVE-2013-0233
Links:

Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.

Affected versions: ["1.5.3", "1.5.2", "1.5.1", "1.5.0", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.1.2", "2.1.0", "2.2.2", "2.2.1", "2.2.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie

Published date: 2016-01-18
CVE: 2015-8314
CVSS V3: 7.5
Links:

Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Affected versions: ["3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby confirmation token validation with a blank string

Published date: 2019-09-08
CVE: 2019-16109
CVSS V3: 5.3
Links:

Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmationtoken column. However, there is no scenario within Devise itself in which such database records would exist.

Affected versions: ["4.7.0", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable module

Published date: 2019-02-07
CVE: 2019-5421
CVSS V2: 7.5
CVSS V3: 9.8
Links:

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Affected versions: ["4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

CSRF token fixation attacks in Devise

Published date: 2013-08-02
Links:

Devise contains a flaw that allows a remote, user-assisted attacker to conduct a CSRF token fixation attack. This issue is triggered as previous CSRF tokens are not properly invalidated when a new token is created. If an attacker has knowledge of said token, a specially crafted request can be made to it, allowing the attacker to conduct CSRF attacks.

Affected versions: ["3.0.0", "3.0.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

167 Other Versions

Version License Security Released
4.9.4 MIT 2024-04-10 - 12:27 22 days
4.9.3 MIT 2023-10-11 - 22:08 7 months
4.9.2 MIT 2023-04-03 - 12:23 about 1 year
4.9.1 MIT 2023-03-31 - 12:39 about 1 year
4.9.0 MIT 2023-02-17 - 14:14 about 1 year
4.8.1 MIT 2021-12-16 - 11:07 over 2 years
4.8.0 MIT 2021-04-29 - 11:52 about 3 years
4.7.3 MIT 2020-09-21 - 00:21 over 3 years
4.7.2 MIT 2020-06-10 - 18:31 almost 4 years
4.7.1 MIT 2019-09-06 - 18:02 over 4 years
4.7.0 MIT 2 2019-08-19 - 16:47 over 4 years
4.6.2 MIT 2 2019-03-26 - 16:55 about 5 years
4.6.1 MIT 2 2019-02-11 - 15:28 about 5 years
4.6.0 MIT 2 2019-02-07 - 17:41 about 5 years
4.5.0 MIT 4 2018-08-15 - 23:30 over 5 years
4.4.3 MIT 4 2018-03-18 - 00:00 about 6 years
4.4.2 MIT 4 2018-03-15 - 13:50 about 6 years
4.4.1 MIT 4 2018-01-23 - 18:11 over 6 years
4.4.0 MIT 4 2017-12-29 - 19:50 over 6 years
4.3.0 MIT 4 2017-05-15 - 00:12 almost 7 years
4.2.1 MIT 4 2017-03-15 - 15:36 about 7 years
4.2.0 MIT 4 2016-07-01 - 17:45 almost 8 years
4.1.1 MIT 4 2016-05-15 - 15:04 almost 8 years
4.1.0 MIT 4 2016-05-03 - 02:52 almost 8 years
4.0.3 MIT 4 2016-05-15 - 15:08 almost 8 years
4.0.2 MIT 4 2016-05-03 - 02:44 almost 8 years
4.0.1 MIT 4 2016-04-25 - 20:07 about 8 years
4.0.0 MIT 4 2016-04-18 - 14:53 about 8 years
4.0.0.rc2 MIT 4 2016-03-09 - 14:31 about 8 years
4.0.0.rc1 MIT 4 2016-02-01 - 11:21 about 8 years
3.5.10 MIT 4 2016-05-15 - 15:14 almost 8 years
3.5.9 MIT 4 2016-05-03 - 02:47 almost 8 years
3.5.8 MIT 4 2016-04-25 - 19:58 about 8 years
3.5.7 MIT 4 2016-04-18 - 14:59 about 8 years
3.5.6 MIT 4 2016-02-01 - 11:10 about 8 years
3.5.5 MIT 4 2016-01-22 - 19:23 over 8 years
3.5.4 MIT 4 2016-01-18 - 14:12 over 8 years
3.5.3 MIT 6 2015-12-10 - 16:37 over 8 years
3.5.2 MIT 6 2015-08-10 - 12:47 over 8 years
3.5.1 MIT 6 2015-05-26 - 13:26 almost 9 years
3.4.1 MIT 6 2014-10-29 - 14:59 over 9 years
3.4.0 MIT 6 2014-10-03 - 17:28 over 9 years
3.3.0 MIT 6 2014-08-13 - 16:42 over 9 years
3.2.4 MIT 6 2014-03-17 - 14:16 about 10 years
3.2.3 MIT 6 2014-02-20 - 18:33 about 10 years
3.2.2 MIT 6 2013-11-25 - 11:00 over 10 years
3.2.1 MIT 6 2013-11-13 - 13:25 over 10 years
3.2.0 MIT 6 2013-11-06 - 20:51 over 10 years
3.1.2 MIT 6 2013-11-13 - 13:24 over 10 years
3.1.1 MIT 6 2013-10-01 - 15:51 over 10 years
3.1.0 MIT 6 2013-09-05 - 22:50 over 10 years
3.1.0.rc2 MIT 6 2013-08-18 - 08:18 over 10 years
3.0.4 MIT 6 2013-11-13 - 13:24 over 10 years
3.0.3 MIT 6 2013-08-18 - 08:26 over 10 years
3.0.2 MIT 6 2013-08-09 - 08:24 over 10 years
3.0.1 MIT 6 2013-08-02 - 21:25 over 10 years
3.0.0 MIT 7 2013-07-14 - 18:48 almost 11 years
3.0.0.rc MIT 7 2013-05-07 - 16:35 almost 11 years
2.2.8 MIT 6 2013-11-13 - 13:24 over 10 years
2.2.7 MIT 6 2013-08-18 - 08:29 over 10 years
2.2.6 MIT 6 2013-08-09 - 08:32 over 10 years
2.2.5 MIT 6 2013-08-02 - 21:24 over 10 years
2.2.4 MIT 6 2013-05-07 - 15:54 almost 11 years
2.2.3 UNKNOWN 6 2013-01-28 - 14:49 over 11 years
2.2.2 UNKNOWN 8 2013-01-15 - 20:03 over 11 years
2.2.1 UNKNOWN 8 2013-01-11 - 18:16 over 11 years
2.2.0 UNKNOWN 8 2013-01-08 - 20:31 over 11 years
2.2.0.rc UNKNOWN 7 2012-12-13 - 09:05 over 11 years
2.1.4 UNKNOWN 7 2013-08-18 - 08:38 over 10 years
2.1.3 UNKNOWN 7 2013-01-28 - 14:49 over 11 years
2.1.2 UNKNOWN 8 2012-06-19 - 09:27 almost 12 years
2.1.0 UNKNOWN 8 2012-05-15 - 17:16 almost 12 years
2.1.0.rc2 UNKNOWN 7 2012-05-09 - 22:54 almost 12 years
2.1.0.rc UNKNOWN 7 2012-03-15 - 14:19 about 12 years
2.0.6 UNKNOWN 7 2013-08-18 - 08:44 over 10 years
2.0.5 UNKNOWN 7 2013-01-28 - 14:49 over 11 years
2.0.4 UNKNOWN 8 2012-02-17 - 08:32 about 12 years
2.0.2 UNKNOWN 8 2012-02-15 - 16:26 about 12 years
2.0.1 UNKNOWN 8 2012-02-09 - 10:15 about 12 years
2.0.0 UNKNOWN 8 2012-01-26 - 19:45 over 12 years
2.0.0.rc2 UNKNOWN 7 2012-01-24 - 13:29 over 12 years
2.0.0.rc UNKNOWN 7 2011-12-19 - 12:36 over 12 years
1.5.4 UNKNOWN 7 2013-01-28 - 14:49 over 11 years
1.5.3 UNKNOWN 8 2011-12-19 - 11:57 over 12 years
1.5.2 UNKNOWN 8 2011-11-30 - 09:26 over 12 years
1.5.1 UNKNOWN 8 2011-11-22 - 15:13 over 12 years
1.5.0 UNKNOWN 8 2011-11-13 - 21:23 over 12 years
1.5.0.rc1 UNKNOWN 7 2011-11-10 - 21:27 over 12 years
1.4.9 UNKNOWN 8 2011-10-20 - 14:50 over 12 years
1.4.8 UNKNOWN 8 2011-10-10 - 12:44 over 12 years
1.4.7 UNKNOWN 8 2011-09-22 - 09:51 over 12 years
1.4.5 UNKNOWN 8 2011-09-08 - 21:54 over 12 years
1.4.3 UNKNOWN 8 2011-08-30 - 12:43 over 12 years
1.4.2 UNKNOWN 8 2011-06-30 - 18:20 almost 13 years
1.4.1 UNKNOWN 8 2011-06-29 - 23:30 almost 13 years
1.3.4 UNKNOWN 8 2011-04-29 - 12:16 about 13 years
1.3.3 UNKNOWN 8 2011-04-21 - 17:19 about 13 years
1.3.2 UNKNOWN 8 2011-04-21 - 12:00 about 13 years
1.3.1 UNKNOWN 8 2011-04-19 - 08:40 about 13 years
1.3.0 UNKNOWN 8 2011-04-16 - 11:32 about 13 years