Directory traversal vulnerability in Novell GroupWise 5.5 and 6.0 allows remote attackers to read arbitrary files via a request for /servlet/webacc?User.html= that contains “…/” (dot dot) sequences and a null character.
online.securityfocus.com/archive/1/220667
support.novell.com/servlet/tidfinder/2960443
www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/advisories_template.htm%3Findexid%3D12
www.kb.cert.org/vuls/id/341539
www.novell.com/coolsolutions/gwmag/features/a_webaccess_security_gw.html
www.securityfocus.com/bid/3436
exchange.xforce.ibmcloud.com/vulnerabilities/7287