Vulnerabilities in i18next software