Ruby/devise/3.2.4


Flexible authentication solution for Rails with Warden

https://rubygems.org/gems/devise
MIT

6 Security Vulnerabilities

devise Time-of-check Time-of-use Race Condition vulnerability

Published date: 2019-03-19T18:03:25Z
CVE: CVE-2019-5421
Links:

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Affected versions: ["4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Unauthorized Access Using "Remember Me" Cookie

Published date: 2023-01-26T23:54:07Z
CVE: CVE-2015-8314
Links:

Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Affected versions: ["3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Authentication Bypass in Devise

Published date: 2019-09-11T23:06:57Z
CVE: CVE-2019-16109
Links:

An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmationtoken column. (However, there is no scenario within Devise itself in which such database records would exist.)

Affected versions: ["4.7.0", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie

Published date: 2016-01-18
CVE: 2015-8314
CVSS V3: 7.5
Links:

Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Affected versions: ["3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby confirmation token validation with a blank string

Published date: 2019-09-08
CVE: 2019-16109
CVSS V3: 5.3
Links:

Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmationtoken column. However, there is no scenario within Devise itself in which such database records would exist.

Affected versions: ["4.7.0", "4.6.2", "4.6.1", "4.6.0", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable module

Published date: 2019-02-07
CVE: 2019-5421
CVSS V2: 7.5
CVSS V3: 9.8
Links:

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

Affected versions: ["4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.1.0", "4.0.3", "4.0.2", "4.0.1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.8", "3.5.7", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.3", "3.2.2", "3.2.1", "3.2.0", "3.1.2", "3.1.1", "3.1.0", "3.1.0.rc2", "3.0.4", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.8", "2.2.7", "2.2.6", "2.2.5", "2.2.4", "2.2.3", "2.2.2", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.4", "2.1.3", "2.1.2", "2.1.0", "2.1.0.rc2", "2.1.0.rc", "2.0.6", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "2.0.0.rc", "1.5.4", "1.5.3", "1.5.2", "1.5.1", "1.5.0", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.7", "1.4.5", "1.4.3", "1.4.2", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.0", "1.2.rc2", "1.2.rc", "1.1.9", "1.1.8", "1.1.7", "1.1.6", "1.1.5", "1.1.4", "1.1.3", "1.1.2", "1.1.1", "1.1.0", "1.1.rc2", "1.1.rc1", "1.1.rc0", "1.1.pre4", "1.1.pre3", "1.1.pre2", "1.1.pre", "1.0.11", "1.0.10", "1.0.9", "1.0.8", "1.0.7", "1.0.6", "1.0.5", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "0.9.2", "0.9.1", "0.9.0", "0.8.2", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.1", "0.7.0", "0.6.3", "0.6.2", "0.6.1", "0.6.0", "0.5.6", "0.5.5", "0.5.4", "0.5.3", "0.5.2", "0.5.1", "0.5.0", "0.4.3", "0.4.2", "0.4.1", "0.4.0", "0.3.0", "0.2.3", "0.2.2", "0.2.1", "0.2.0", "0.1.1", "0.1.0"]
Secure versions: [4.7.3, 4.7.2, 4.7.1, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation: Update to version 4.9.4.

167 Other Versions

Version License Security Released
1.2.1 UNKNOWN 8 2011-03-28 - 18:52 about 13 years
1.2.0 UNKNOWN 8 2011-03-25 - 14:56 about 13 years
1.2.rc2 UNKNOWN 8 2011-03-11 - 19:57 about 13 years
1.2.rc UNKNOWN 8 2010-11-26 - 11:30 over 13 years
1.1.9 UNKNOWN 8 2011-03-25 - 14:52 about 13 years
1.1.8 UNKNOWN 8 2011-03-11 - 20:23 about 13 years
1.1.7 UNKNOWN 8 2011-02-16 - 20:04 about 13 years
1.1.6 UNKNOWN 8 2011-02-15 - 10:19 about 13 years
1.1.5 UNKNOWN 8 2010-11-27 - 20:53 over 13 years
1.1.4 UNKNOWN 8 2010-11-26 - 12:18 over 13 years
1.1.3 UNKNOWN 8 2010-09-24 - 07:39 over 13 years
1.1.2 UNKNOWN 8 2010-08-25 - 11:45 over 13 years
1.1.1 UNKNOWN 8 2010-07-27 - 14:29 almost 14 years
1.1.0 UNKNOWN 8 2010-07-26 - 18:25 almost 14 years
1.1.pre4 UNKNOWN 8 2010-03-03 - 11:22 about 14 years
1.1.pre3 UNKNOWN 8 2010-02-24 - 21:20 about 14 years
1.1.pre2 UNKNOWN 8 2010-02-18 - 17:06 about 14 years
1.1.pre UNKNOWN 8 2010-02-17 - 12:57 about 14 years
1.1.rc2 UNKNOWN 8 2010-06-23 - 10:39 almost 14 years
1.1.rc1 UNKNOWN 8 2010-04-15 - 06:45 about 14 years
1.1.rc0 UNKNOWN 8 2010-04-03 - 11:20 about 14 years
1.0.11 UNKNOWN 8 2011-03-11 - 20:45 about 13 years
1.0.10 UNKNOWN 8 2011-02-15 - 19:27 about 13 years
1.0.9 UNKNOWN 8 2010-11-26 - 12:26 over 13 years
1.0.8 UNKNOWN 8 2010-06-23 - 10:22 almost 14 years
1.0.7 UNKNOWN 8 2010-05-03 - 11:58 almost 14 years
1.0.6 UNKNOWN 8 2010-04-03 - 11:25 about 14 years
1.0.5 UNKNOWN 8 2010-03-26 - 12:04 about 14 years
1.0.4 UNKNOWN 8 2010-03-03 - 11:24 about 14 years
1.0.3 UNKNOWN 8 2010-02-23 - 14:45 about 14 years
1.0.2 UNKNOWN 8 2010-02-17 - 20:32 about 14 years
1.0.1 UNKNOWN 8 2010-02-15 - 13:19 about 14 years
1.0.0 UNKNOWN 8 2010-02-09 - 01:17 about 14 years
0.9.2 UNKNOWN 8 2010-02-05 - 20:37 about 14 years
0.9.1 UNKNOWN 8 2010-01-25 - 19:22 over 14 years
0.9.0 UNKNOWN 8 2010-01-21 - 14:31 over 14 years
0.8.2 UNKNOWN 8 2010-01-13 - 16:47 over 14 years
0.8.1 UNKNOWN 8 2010-01-08 - 22:27 over 14 years
0.8.0 UNKNOWN 8 2010-01-07 - 21:50 over 14 years
0.7.5 UNKNOWN 8 2010-01-02 - 09:12 over 14 years
0.7.4 UNKNOWN 8 2009-12-22 - 21:05 over 14 years
0.7.3 UNKNOWN 8 2009-12-16 - 00:29 over 14 years
0.7.2 UNKNOWN 8 2009-12-15 - 00:05 over 14 years
0.7.1 UNKNOWN 8 2009-12-08 - 22:40 over 14 years
0.7.0 UNKNOWN 8 2009-12-07 - 23:00 over 14 years
0.6.3 UNKNOWN 8 2009-12-02 - 18:41 over 14 years
0.6.2 UNKNOWN 8 2009-11-25 - 01:20 over 14 years
0.6.1 UNKNOWN 8 2009-11-24 - 02:09 over 14 years
0.6.0 UNKNOWN 8 2009-11-23 - 01:23 over 14 years
0.5.6 UNKNOWN 8 2009-11-21 - 22:08 over 14 years
0.5.5 UNKNOWN 8 2009-11-19 - 22:55 over 14 years
0.5.4 UNKNOWN 8 2009-11-19 - 15:14 over 14 years
0.5.3 UNKNOWN 8 2009-11-18 - 11:48 over 14 years
0.5.2 UNKNOWN 8 2009-11-17 - 19:39 over 14 years
0.5.1 UNKNOWN 8 2009-11-15 - 20:15 over 14 years
0.5.0 UNKNOWN 8 2009-11-14 - 02:01 over 14 years
0.4.3 UNKNOWN 8 2009-11-10 - 03:01 over 14 years
0.4.2 UNKNOWN 8 2009-11-06 - 20:01 over 14 years
0.4.1 UNKNOWN 8 2009-11-04 - 03:34 over 14 years
0.4.0 UNKNOWN 8 2009-11-03 - 16:29 over 14 years
0.3.0 UNKNOWN 8 2009-10-30 - 13:43 over 14 years
0.2.3 UNKNOWN 8 2009-10-29 - 18:10 over 14 years
0.2.2 UNKNOWN 8 2009-10-28 - 13:33 over 14 years
0.2.1 UNKNOWN 8 2009-10-28 - 03:12 over 14 years
0.2.0 UNKNOWN 8 2009-10-25 - 01:45 over 14 years
0.1.1 UNKNOWN 8 2009-10-21 - 20:07 over 14 years
0.1.0 UNKNOWN 8 2009-10-21 - 05:34 over 14 years