Vulnerabilities in pikepdf 2.2.3