Identify the security vulnerability in the following example:
1 <?php
2 echo "Welcome, {$_POST['name']}.";
3 ?>
SQL Injection
Cross-Site Scripting
Remote Code Injection
None of the above
Submit