Sudo lets you run any terminal command as another user — hence "substitute user" — but the default and most common use for it ...
Back in the late 1990s, SQL injection changed the trajectory of application security. Attackers realized they could manipulate backend databases simply by inserting malicious code into user inputs.