What are some common pitfalls to be aware of when working with SQL Injections in PHP?

One common pitfall when working with SQL Injections in PHP is not properly sanitizing user input before using it in SQL queries. To prevent SQL Injections, always use prepared statements with parameterized queries to securely pass user input to the database without the risk of injection attacks.

// Example of using prepared statements to prevent SQL Injections in PHP

// Establish a database connection
$pdo = new PDO("mysql:host=localhost;dbname=mydatabase", "username", "password");

// Prepare a SQL statement with a parameterized query
$stmt = $pdo->prepare("SELECT * FROM users WHERE username = :username");

// Bind the user input to the query parameter
$username = $_POST['username'];
$stmt->bindParam(':username', $username);

// Execute the query
$stmt->execute();

// Fetch the results
$results = $stmt->fetchAll(PDO::FETCH_ASSOC);

// Display the results
foreach ($results as $row) {
    echo $row['username'] . "<br>";
}