mysql_real_escape_string() addslashes() ( xss xsrf?), , , SQL Injection.
, SQL-:
mysql_query("select * from user where id=".mysql_real_escape_string($_GET[id]));
Exploit:
http://localhost/test.php?id=1 or sleep(50)
:
mysql_query("select * from user where id='".mysql_real_escape_string($_GET[id])."'");
ADODB PDO, , .