Ghidra/RuntimeScripts/Linux/support/launch.sh in NSA Ghidra through 10.2.2 passes user-provided input into eval, leading to command injection when calling analyzeHeadless with untrusted input.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22671.json"