Vulnerabilities in pikepdf 2.9.1