A1:2013-InjectionA8:2017-InsecureDeserializationA7:2013-MissingFunctionLevel AccessControlA4:2013-InsecureDirect ObjectReferencesC1:2018-DefineSecurityRequirementsC2:2018-LeverageSecurityFrameworksand LibrariesC10:2018-Handle allErrors andExceptionsC4:2018-Encode andEscape DataA9:2013-UsingComponentswith KnownVulnerabilitiesC9:2018-ImplementSecurityLogging andMonitoringA6:2013-SensitiveDataExposureA6:2017-SecurityMisconfigurationA4:2017-XMLExternalEntities(XXE)A2:2017-BrokenAuthenticationA2:2013-BrokenAuthenticationand SessionManagementC8:2018-ProtectDataEverywhereA1:2017-InjectionC5:2018-ValidateAll InputsA10:2017-InsufficientLogging &MonitoringA7:2017-Cross-SiteScripting(XSS)C7:2018-EnforceAccessControlsC3:2018-SecureDatabaseAccessC6:2018-ImplementDigitalIdentityA5:2017-BrokenAccessControlA3:2013-Cross-SiteScripting(XSS)A3:2017-SensitiveDataExposureA5:2013-SecurityMisconfigurationA10:2013-UnvalidatedRedirectsandForwardsA8:2013-Cross-SiteRequestForgery(CSRF)A9:2017-UsingComponentswith KnownVulnerabilitiesA1:2013-InjectionA8:2017-InsecureDeserializationA7:2013-MissingFunctionLevel AccessControlA4:2013-InsecureDirect ObjectReferencesC1:2018-DefineSecurityRequirementsC2:2018-LeverageSecurityFrameworksand LibrariesC10:2018-Handle allErrors andExceptionsC4:2018-Encode andEscape DataA9:2013-UsingComponentswith KnownVulnerabilitiesC9:2018-ImplementSecurityLogging andMonitoringA6:2013-SensitiveDataExposureA6:2017-SecurityMisconfigurationA4:2017-XMLExternalEntities(XXE)A2:2017-BrokenAuthenticationA2:2013-BrokenAuthenticationand SessionManagementC8:2018-ProtectDataEverywhereA1:2017-InjectionC5:2018-ValidateAll InputsA10:2017-InsufficientLogging &MonitoringA7:2017-Cross-SiteScripting(XSS)C7:2018-EnforceAccessControlsC3:2018-SecureDatabaseAccessC6:2018-ImplementDigitalIdentityA5:2017-BrokenAccessControlA3:2013-Cross-SiteScripting(XSS)A3:2017-SensitiveDataExposureA5:2013-SecurityMisconfigurationA10:2013-UnvalidatedRedirectsandForwardsA8:2013-Cross-SiteRequestForgery(CSRF)A9:2017-UsingComponentswith KnownVulnerabilities

Stash OWASP Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
  1. A1:2013-Injection
  2. A8:2017-Insecure Deserialization
  3. A7:2013-Missing Function Level Access Control
  4. A4:2013-Insecure Direct Object References
  5. C1:2018-Define Security Requirements
  6. C2:2018-Leverage Security Frameworks and Libraries
  7. C10:2018-Handle all Errors and Exceptions
  8. C4:2018-Encode and Escape Data
  9. A9:2013-Using Components with Known Vulnerabilities
  10. C9:2018-Implement Security Logging and Monitoring
  11. A6:2013-Sensitive Data Exposure
  12. A6:2017-Security Misconfiguration
  13. A4:2017-XML External Entities (XXE)
  14. A2:2017-Broken Authentication
  15. A2:2013-Broken Authentication and Session Management
  16. C8:2018-Protect Data Everywhere
  17. A1:2017-Injection
  18. C5:2018-Validate All Inputs
  19. A10:2017-Insufficient Logging & Monitoring
  20. A7:2017-Cross-Site Scripting (XSS)
  21. C7:2018-Enforce Access Controls
  22. C3:2018-Secure Database Access
  23. C6:2018-Implement Digital Identity
  24. A5:2017-Broken Access Control
  25. A3:2013-Cross-Site Scripting (XSS)
  26. A3:2017-Sensitive Data Exposure
  27. A5:2013-Security Misconfiguration
  28. A10:2013-Unvalidated Redirects and Forwards
  29. A8:2013-Cross-Site Request Forgery (CSRF)
  30. A9:2017-Using Components with Known Vulnerabilities