description
handling potentially unsafe content: html injection risk (malicious also).
javascript injection also possible by means of injecting a "script" html tag
javascript through "href" html attribute is also possible.
javascript through "onclick" and "onmouseover" are demonstrated also.
distinction between innerText and innerHTML
input of safe or unsafe (malicious also)
here fetch() is demonstrated for content from HTTP (both static and dynamic content, from http servers, files
and/or web apps/apis)
fetch_div1.innerText = text
fetch_div2.innerHTML = text
ES6 string e.g. from PHP's echo