Vulnerabilities in pikepdf 1.8.0