Vulnerabilities in pikepdf