C2:2018- Leverage Security Frameworks and Libraries C4:2018- Encode and Escape Data API5:2023 - Broken Function Level Authorization C1:2018- Define Security Requirements A1:2017- Injection API8:2023 - Security Misconfiguration A8:2017- Insecure Deserialization API9:2023 - Improper Inventory Management C3:2018- Secure Database Access API3:2023 - Broken Object Property Level Authorization A7:2013- Missing Function Level Access Control A6:2013- Sensitive Data Exposure API1:2023 - Broken Object Level Authorization A1:2013- Injection API4:2023 - Unrestricted Resource Consumption A10:2017- Insufficient Logging & Monitoring API6:2023 - Unrestricted Access to Sensitive Business Flows A2:2013- Broken Authentication and Session Management A2:2017- Broken Authentication API10:2023 - Unsafe Consumption of APIs A9:2017- Using Components with Known Vulnerabilities A4:2013- Insecure Direct Object References A9:2013- Using Components with Known Vulnerabilities A7:2017- Cross-Site Scripting (XSS) A5:2017- Broken Access Control A8:2013- Cross-Site Request Forgery (CSRF) API2:2023 - Broken Authentication A3:2017- Sensitive Data Exposure A10:2013- Unvalidated Redirects and Forwards A3:2013- Cross-Site Scripting (XSS) API6:2023 - Unrestricted Access to Sensitive Business Flows A4:2017- XML External Entities (XXE) A6:2017- Security Misconfiguration A5:2013- Security Misconfiguration C2:2018- Leverage Security Frameworks and Libraries C4:2018- Encode and Escape Data API5:2023 - Broken Function Level Authorization C1:2018- Define Security Requirements A1:2017- Injection API8:2023 - Security Misconfiguration A8:2017- Insecure Deserialization API9:2023 - Improper Inventory Management C3:2018- Secure Database Access API3:2023 - Broken Object Property Level Authorization A7:2013- Missing Function Level Access Control A6:2013- Sensitive Data Exposure API1:2023 - Broken Object Level Authorization A1:2013- Injection API4:2023 - Unrestricted Resource Consumption A10:2017- Insufficient Logging & Monitoring API6:2023 - Unrestricted Access to Sensitive Business Flows A2:2013- Broken Authentication and Session Management A2:2017- Broken Authentication API10:2023 - Unsafe Consumption of APIs A9:2017- Using Components with Known Vulnerabilities A4:2013- Insecure Direct Object References A9:2013- Using Components with Known Vulnerabilities A7:2017- Cross-Site Scripting (XSS) A5:2017- Broken Access Control A8:2013- Cross-Site Request Forgery (CSRF) API2:2023 - Broken Authentication A3:2017- Sensitive Data Exposure A10:2013- Unvalidated Redirects and Forwards A3:2013- Cross-Site Scripting (XSS) API6:2023 - Unrestricted Access to Sensitive Business Flows A4:2017- XML External Entities (XXE) A6:2017- Security Misconfiguration A5:2013- Security Misconfiguration
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
C2:2018-Leverage Security Frameworks and Libraries
C4:2018-Encode and Escape Data
API5:2023 - Broken Function Level Authorization
C1:2018-Define Security Requirements
A1:2017-Injection
API8:2023 - Security Misconfiguration
A8:2017-Insecure Deserialization
API9:2023 - Improper Inventory Management
C3:2018-Secure Database Access
API3:2023 - Broken Object Property Level Authorization
A7:2013-Missing Function Level Access Control
A6:2013-Sensitive Data Exposure
API1:2023 - Broken Object Level Authorization
A1:2013-Injection
API4:2023 - Unrestricted Resource Consumption
A10:2017-Insufficient Logging & Monitoring
API6:2023 - Unrestricted Access to Sensitive Business Flows
A2:2013-Broken Authentication and Session Management
A2:2017-Broken Authentication
API10:2023 - Unsafe Consumption of APIs
A9:2017-Using Components with Known Vulnerabilities
A4:2013-Insecure Direct Object References
A9:2013-Using Components with Known Vulnerabilities
A7:2017-Cross-Site Scripting (XSS)
A5:2017-Broken Access Control
A8:2013-Cross-Site Request Forgery (CSRF)
API2:2023 - Broken Authentication
A3:2017-Sensitive Data Exposure
A10:2013-Unvalidated Redirects and Forwards
A3:2013-Cross-Site Scripting (XSS)
API6:2023 - Unrestricted Access to Sensitive Business Flows
A4:2017-XML External Entities (XXE)
A6:2017-Security Misconfiguration
A5:2013-Security Misconfiguration