OWASP ZAP WAVE - Simple XSS in a Form parameter
Description
The 'name' parameter in the form is written to the page without being sanitised and so is vulnerable to a simple script injection attack.
Only a POST is vulnerable, not a GET.
Example
Name: