It adds slashes to:
\x00, \n, \r, \, ', " and \x1a. characters.
Where addslashes only adds slashes to
' \ and NUL
Ilias article is also pretty detailed on its functionality
More Related Contents:
- How can I prevent SQL injection in PHP?
- SQL injection that gets around mysql_real_escape_string()
- How can I sanitize user input with PHP?
- Are PDO prepared statements sufficient to prevent SQL injection?
- Is “mysqli_real_escape_string” enough to avoid SQL injection or other SQL attacks?
- Reference: What is a perfect code sample using the MySQL extension? [closed]
- The ultimate clean/secure function
- Do htmlspecialchars and mysql_real_escape_string keep my PHP code safe from injection?
- When should I use prepared statements?
- Examples of SQL Injections through addslashes()?
- SQL injections in ADOdb and general website security
- Why is using a mysql prepared statement more secure than using the common escape functions?
- how safe are PDO prepared statements
- Is htmlspecialchars enough to prevent an SQL injection on a variable enclosed in single quotes?
- How do I use password hashing with PDO to make my code more secure? [closed]
- PHP: Is mysql_real_escape_string sufficient for cleaning user input?
- PHP image upload security check list
- Many hash iterations: append salt every time?
- PHP: How To Disable Dangerous Functions
- How to prevent multiple logins in PHP website
- What security issues should I look out for in PHP
- Detecting Ajax in PHP and making sure request was from my own website
- Generate cryptographically secure random numbers in php
- Is mysqli_real_escape_string safe?
- Use of Initialization Vector in openssl_encrypt
- Secure User Image Upload Capabilities in PHP
- Set httpOnly and secure on PHPSESSID cookie in PHP
- Does PHP’s $_REQUEST method have a security problem?
- Json: PHP to JavaScript safe or not?
- What encryption algorithm is best for encrypting cookies?