In the past few years, SQL Injection attacks have been on the rise. The increase in the number of Database based applications, together with various publications that explain the problem and how it can be exploited (in both electronic and printed formats), have led to many attacks and abuse of this type of attack.
Following the increase in attacks taking advantage of SQL Injection, many attempts have been made to find solutions to the problem. The obvious solution, of course, is, and always will be, to build the programs in a secure manner.