Vulnerabilities in pikepdf 1.19.2