Vulnerabilities in pikepdf 1.13.0