Redis 6.2

Status Security onlySupport 2021-02 – —Latest 6.2.22Vulnerabilities 36← All Redis versions
Critical 10.0
2025-10-03< 6.2.20

Redis Lua Use-After-Free may lead to remote code execution

High 7.7
2026-05-05< 6.2.22

redis-server RESTORE invalid memory access may allow remote code execution

High 7.5
2025-07-07< 6.2.19

Redis DoS Vulnerability due to bad connection error handling

High 7.5 Unfixed
2025-04-23≤ 6.2.14

Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client

High 7.5
2021-10-04< 6.2.6

Integer overflow issue with Streams in Redis

High 7.5
2021-10-04< 6.2.6

Vulnerability in handling large ziplists

High 7.5
2021-10-04< 6.2.6

Lua scripts can overflow the heap-based Lua stack in Redis

High 7.5
2021-10-04< 6.2.6

Integer overflow issue with intsets in Redis

High 7.5
2021-10-04< 6.2.6

DoS vulnerability in Redis

High 7.5
2021-10-04< 6.2.6

Integer overflow that can lead to heap overflow in redis-cli, redis-sentinel on some platforms

High 7.5
2021-10-04< 6.2.6

Integer overflow issue with strings in Redis

High 7.0
2025-07-07< 6.2.19

Redis allows out of bounds writes in hyperloglog commands leading to RCE

High 7.0
2025-10-03< 6.2.20

Lua library commands may lead to integer overflow and potential RCE

High 7.0
2025-01-06< 6.2.14

Redis' Lua library commands may lead to remote code execution

High 7.0
2024-10-07< 6.2.16

Lua library commands may lead to stack overflow and RCE in Redis

High 7.0
2023-07-13< 6.2.13

Heap overflow issue with the Lua cjson library used by Redis

Medium 6.3
2025-10-03< 6.2.20

Redis is vulnerable to DoS via specially crafted LUA scripts

Medium 6.0
2025-10-03< 6.2.20

Redis: Authenticated users can execute LUA scripts as a different user

Medium 5.9
2023-07-15< 6.2.3

redis: an assertion failure in a primary server by sending a non-administrative command

Medium 5.5
2024-10-07< 6.2.16

Denial-of-service due to unbounded pattern matching in Redis

Medium 5.5
2023-01-20< 6.2.9

Integer overflow in multiple Redis commands can lead to denial-of-service

Medium 5.5
2023-03-02< 6.2.11

Integer Overflow in several Redis commands can lead to denial of service.

Medium 5.5
2023-04-18< 6.2.12

`HINCRBYFLOAT` can be used to crash a redis-server process

Medium 5.5
2023-01-20< 6.2.9

Integer overflow in certain command arguments can drive Redis to OOM panic

Medium 5.5
2023-03-01< 6.2.11

Redis string pattern matching can be abused to achieve Denial of Service

Medium 5.3
2021-10-04< 6.2.6

Vulnerability in Lua Debugger in Redis

Low 3.9
2022-04-27< 6.2.7

Lua scripts can be manipulated to overcome ACL rules in Redis

Low 3.6
2023-10-18< 6.2.14

Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.

Low 3.3
2022-04-27< 6.2.7

A Malformed Lua script can crash Redis

Low 3.1
2022-10-21< 6.2.8

Redis Crash Report debug.c sigsegvHandler denial of service

N/A
2021-03-31< 6.2.0

N/A
2021-05-04< 6.2.3

N/A
2021-05-04< 6.2.3

N/A
2021-06-02< 6.2.4

N/A
2021-07-21< 6.2.5

N/A
2023-04-22< 6.2.9