Vulnerabilities in pikepdf 2.1.0