Vulnerabilities in pikepdf 2.4.0