Known Vulnerabilities in Tuleap Authentication