MyScrapbook 3.1 allows remote attackers to obtain sensitive information via a direct request to files in the txt-db-api directory such as txt-db-api/sql.php, which reveals the path in an error message.Referenceshttp://www.securityfocus.com/archive/1/436792/100/0/threadedhttp://www.vupen.com/english/advisories/2006/2311http://secunia.com/advisories/20599http://www.osvdb.org/26414https://exchange.xforce.ibmcloud.com/vulnerabilities/27165