Vulnerabilities in pikepdf 2.5.1