Detection and Exploitation of an SQL Injection: Simple Example to Understand the Stakes