You are conducting a vulnerability assessment on a web application. The application has a SQL injection vulnerability which can be exploited to access the application's database. The vulnerability can be triggered without any user credentials. Which of the following best describes the privileges required to exploit this vulnerability?
User-level privileges
Administrative privileges
None
Root privileges