(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
A6:2013-Sensitive Data Exposure
A10:2013-Unvalidated Redirects and Forwards
API6:2023 - Unrestricted Access to Sensitive Business Flows
A9:2017-Using Components with Known Vulnerabilities
API5:2023 - Broken Function Level Authorization
C2:2018-Leverage Security Frameworks and Libraries
C1:2018-Define Security Requirements
C3:2018-Secure Database Access
API1:2023 - Broken Object Level Authorization
A8:2017-Insecure Deserialization
API4:2023 - Unrestricted Resource Consumption
API8:2023 - Security Misconfiguration
A6:2017-Security Misconfiguration
A5:2013-Security Misconfiguration
API9:2023 - Improper Inventory Management
A3:2017-Sensitive Data Exposure
A9:2013-Using Components with Known Vulnerabilities
C4:2018-Encode and Escape Data
A4:2013-Insecure Direct Object References
A3:2013-Cross-Site Scripting (XSS)
A5:2017-Broken Access Control
API10:2023 - Unsafe Consumption of APIs
A1:2013-Injection
A4:2017-XML External Entities (XXE)
API2:2023 - Broken Authentication
A1:2017-Injection
A2:2013-Broken Authentication and Session Management
A2:2017-Broken Authentication
API6:2023 - Unrestricted Access to Sensitive Business Flows