Known Vulnerabilities in Tuleap Authentication 1.1.1