Vulnerabilities in pikepdf 2.6.0