OWASP ZAP WAVE - Simple SQL injection in a URL parameter
Description
The 'name' parameter in the URL is put in a db table without being sanitised and not using a prepared statement and so is vulnerable to an SQL injection attack.
Only a GET is vulnerable, not a POST.
Example
Example link: Simple SQL injection in a URL parameter