Vulnerabilities in pikepdf 2.2.0