ethical-hacker video for you are a security analyst investigating a web application that allows users to submit comments. The application stores these comments
You are a security analyst investigating a web application that allows users to submit comments. The application stores these comments in a database and displays them to other users. During your assessment, you notice that the application does not properly sanitize user input. What type of attack could an attacker exploit in this scenario, and what is the most likely impact?