Vulnerabilities in pikepdf 1.7.1