In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-45908.json"