Vulnerabilities in pikepdf 2.2.4