Briefing Zend Knowledge

Identify the security vulnerability in the following example: <code> 1 <?php 2 echo "W

Identify the security vulnerability in the following example:
<code>
1 <?php
2 echo “Welcome, {$_POST[‘name’]}.”;
3 ?>
</code>

A.
SQL Injection

B.
Cross-Site Scripting

C.
Remote Code Injection

D.
None of the above