A BugTraq report states that the Lotus HTTP server can be fooled into locking a database by using a specially
crafted URL, thereby causing a denial-of-service on that database. However, IBM's response to this issue
states that in order for this exploit to be successful, the database must not have been previously accessed
either by a server task or by a user. It affects only the database specified in the URL, not the entire server.
Due to the rare conditions needed for this exploit to be successful, it is highly unlikely to be exploited outside
of a lab or testing environment. If it is found to occur, the server must be restarted to release the lock
on the database.