OWASP ZAP WAVE - Simple SQL injection in a Form parameter

Description

The 'name' parameter in the form is put in a db table without being sanitised and not using a prepared statement and so is vulnerable to an SQL injection attack.
Only a POST is vulnerable, not a GET.

Example

Name: