Vulnerabilities in i18next