Known Vulnerabilities in Easy Registration Forms 2.1.1