Vulnerabilities in pikepdf 1.17.1