Vulnerabilities in pikepdf 1.11.2