Vulnerabilities in pikepdf 1.12.0