You are conducting a vulnerability assessment on a web application. The application has a SQL injection vulnerability which can be exploited to access the application's database. The vulnerability can be triggered without any user credentials. Which of the following best describes the privileges required to exploit this vulnerability?
Administrative privileges
Root privileges
User-level privileges
None