Redis 2.0

Status EOLSupport 2010-09 – 2011-03Latest 2.0.5Vulnerabilities 19← All Redis versions
Critical 10.0 Unfixed
2025-10-03≤ 2.0.5

Redis Lua Use-After-Free may lead to remote code execution

High 7.5 Unfixed
2021-10-04≤ 2.0.5

Vulnerability in handling large ziplists

High 7.5 Unfixed
2021-10-04≤ 2.0.5

Integer overflow issue with intsets in Redis

High 7.5 Unfixed
2021-10-04≤ 2.0.5

Integer overflow that can lead to heap overflow in redis-cli, redis-sentinel on some platforms

High 7.5 Unfixed
2021-10-04≤ 2.0.5

Integer overflow issue with strings in Redis

High 7.0 Unfixed
2025-10-03≤ 2.0.5

Lua library commands may lead to integer overflow and potential RCE

High 7.0 Unfixed
2023-07-13≤ 2.0.5

Heap overflow issue with the Lua cjson library used by Redis

Medium 6.3 Unfixed
2025-10-03≤ 2.0.5

Redis is vulnerable to DoS via specially crafted LUA scripts

Medium 6.0 Unfixed
2025-10-03≤ 2.0.5

Redis: Authenticated users can execute LUA scripts as a different user

Medium 5.5 Unfixed
2023-01-20≤ 2.0.5

Integer overflow in certain command arguments can drive Redis to OOM panic

Medium 5.5 Unfixed
2023-03-01≤ 2.0.5

Redis string pattern matching can be abused to achieve Denial of Service

Medium 5.5 Unfixed
2023-03-02≤ 2.0.5

Integer Overflow in several Redis commands can lead to denial of service.

Medium 5.5 Unfixed
2023-04-18≤ 2.0.5

`HINCRBYFLOAT` can be used to crash a redis-server process

Low 3.9 Unfixed
2022-04-27≤ 2.0.5

Lua scripts can be manipulated to overcome ACL rules in Redis

Low 3.3 Unfixed
2022-04-27≤ 2.0.5

A Malformed Lua script can crash Redis

N/A Unfixed
2016-08-10≤ 2.0.5

N/A Unfixed
2019-11-01≤ 2.0.5

N/A Unfixed
2019-11-01≤ 2.0.5

N/A Unfixed
2018-06-16≤ 2.0.5