Vulnerabilities

Validating Data
Making sure you're getting what you think you're getting

Preventing Cross-Site Scripting
Don't let one user run client-side code on another user's browser

Preventing Command Injection
Don't let a malicious user monkey around with your database or filesystem.