Jigsaw 2.2.1 on Windows systems allows remote attackers to use MS-DOS device names in HTTP requests to (1) cause a denial of service using the "con" device, or (2) obtain the physical path of the server using two requests to the "aux" device.
http://www.securityfocus.com/bid/5258
http://www.securityfocus.com/bid/5251
http://www.iss.net/security_center/static/9587.php
http://www.iss.net/security_center/static/9586.php
http://marc.info/?l=bugtraq&m=102692936820193&w=2
http://marc.info/?l=bugtraq&m=102691753204392&w=2
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0031.html
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0028.html