Vulnerabilities in pikepdf 2.2.1