A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
An attacker can exploit the issue using a browser.
The following example URl is available.
http://www.example.com/index.php?page=contacter.php&id=-1 union select 1,2--%20