I know SQL Injection is one... what are the others...
You could consider the chapters of this book to be a pretty good checklist...
19 Deadly Sins of Software Security