In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
{ "nvd_published_at": "2022-11-26T02:15:00Z", "github_reviewed_at": "2022-11-30T21:19:52Z", "severity": "CRITICAL", "github_reviewed": true, "cwe_ids": [ "CWE-94" ] }