Vulnerabilities in pikepdf 2.5.0