Vulnerabilities in pikepdf 2.3.0