SQL Injection prevention

Summary
Based on the found vulnerable issues, what should you do to secure your applications?