Vulnerabilities in pikepdf 2.1.1