Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
mem0ai mem0 faiss.py pickle.dump deserialization
Vulnerability Description
A vulnerability was found in mem0ai mem0 up to 1.0.11. This affects the function pickle.load/pickle.dump of the file mem0/vector_stores/faiss.py. Performing a manipulation results in deserialization. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The patch is named 62dca096f9236010ca15fea9ba369ba740b86b7a. Applying a patch is the recommended action to fix this issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
可信数据的反序列化
Vulnerability Title
mem0 输入验证错误漏洞
Vulnerability Description
mem0是Mem0开源的一个高效记忆算法基准测试工具。 mem0 1.0.11及之前版本存在输入验证错误漏洞,该漏洞源于mem0/vector_stores/faiss.py文件中pickle.load/pickle.dump函数操作不当,可能导致反序列化。
CVSS Information
N/A
Vulnerability Type
N/A