The code demonstrates a SQL injection vulnerability in Baykus Yemek Tarifleri <= 2.1 via the 'id' parameter in oku.php. The vulnerability arises from unsanitized user input directly interpolated into a SQL query.
Classification
Working Poc 90%
Attack Type
Sqli
Complexity
Trivial
Reliability
Reliable
Target:Baykus Yemek Tarifleri <= 2.1
No auth needed
Prerequisites:Access to the vulnerable endpoint (oku.php)