Vulnerabilities in pikepdf 1.15.0