Further explanation:
I use custom PHP / MySQL functions to execute my queries (dynamic MySQLi, not prep. statements).
If I include in my function a code that replaces the following chars, \ < > ' " - ; ( ) with their HTML code, before executing the query, is it possible to bypass this security measure? If so, then can you, please, explain how?
Furthermore, I am not interested in running prepared statements, or any other kind of escaping script or function. Also, I will initially convert the input string to UTF-8.
P.S.: I know this question has a lot of versions, is debatable and controversial, but I searched for and have not found a satisfying answer.
Thank you in advance for your wise answers.