Vulnerabilities in pikepdf 1.16.1