A8:2017- Insecure Deserialization C3:2018- Secure Database Access API6:2023 - Unrestricted Access to Sensitive Business Flows A6:2013- Sensitive Data Exposure A1:2017- Injection API3:2023 - Broken Object Property Level Authorization A9:2013- Using Components with Known Vulnerabilities API9:2023 - Improper Inventory Management A7:2013- Missing Function Level Access Control A7:2017- Cross-Site Scripting (XSS) A10:2017- Insufficient Logging & Monitoring API8:2023 - Security Misconfiguration API2:2023 - Broken Authentication A4:2013- Insecure Direct Object References C4:2018- Encode and Escape Data A5:2017- Broken Access Control A3:2017- Sensitive Data Exposure A2:2017- Broken Authentication API4:2023 - Unrestricted Resource Consumption C1:2018- Define Security Requirements A9:2017- Using Components with Known Vulnerabilities API6:2023 - Unrestricted Access to Sensitive Business Flows A4:2017- XML External Entities (XXE) API5:2023 - Broken Function Level Authorization A10:2013- Unvalidated Redirects and Forwards A1:2013- Injection A8:2013- Cross-Site Request Forgery (CSRF) A5:2013- Security Misconfiguration C2:2018- Leverage Security Frameworks and Libraries A3:2013- Cross-Site Scripting (XSS) API10:2023 - Unsafe Consumption of APIs A6:2017- Security Misconfiguration A2:2013- Broken Authentication and Session Management API1:2023 - Broken Object Level Authorization A8:2017- Insecure Deserialization C3:2018- Secure Database Access API6:2023 - Unrestricted Access to Sensitive Business Flows A6:2013- Sensitive Data Exposure A1:2017- Injection API3:2023 - Broken Object Property Level Authorization A9:2013- Using Components with Known Vulnerabilities API9:2023 - Improper Inventory Management A7:2013- Missing Function Level Access Control A7:2017- Cross-Site Scripting (XSS) A10:2017- Insufficient Logging & Monitoring API8:2023 - Security Misconfiguration API2:2023 - Broken Authentication A4:2013- Insecure Direct Object References C4:2018- Encode and Escape Data A5:2017- Broken Access Control A3:2017- Sensitive Data Exposure A2:2017- Broken Authentication API4:2023 - Unrestricted Resource Consumption C1:2018- Define Security Requirements A9:2017- Using Components with Known Vulnerabilities API6:2023 - Unrestricted Access to Sensitive Business Flows A4:2017- XML External Entities (XXE) API5:2023 - Broken Function Level Authorization A10:2013- Unvalidated Redirects and Forwards A1:2013- Injection A8:2013- Cross-Site Request Forgery (CSRF) A5:2013- Security Misconfiguration C2:2018- Leverage Security Frameworks and Libraries A3:2013- Cross-Site Scripting (XSS) API10:2023 - Unsafe Consumption of APIs A6:2017- Security Misconfiguration A2:2013- Broken Authentication and Session Management API1:2023 - Broken Object Level Authorization
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
A8:2017-Insecure Deserialization
C3:2018-Secure Database Access
API6:2023 - Unrestricted Access to Sensitive Business Flows
A6:2013-Sensitive Data Exposure
A1:2017-Injection
API3:2023 - Broken Object Property Level Authorization
A9:2013-Using Components with Known Vulnerabilities
API9:2023 - Improper Inventory Management
A7:2013-Missing Function Level Access Control
A7:2017-Cross-Site Scripting (XSS)
A10:2017-Insufficient Logging & Monitoring
API8:2023 - Security Misconfiguration
API2:2023 - Broken Authentication
A4:2013-Insecure Direct Object References
C4:2018-Encode and Escape Data
A5:2017-Broken Access Control
A3:2017-Sensitive Data Exposure
A2:2017-Broken Authentication
API4:2023 - Unrestricted Resource Consumption
C1:2018-Define Security Requirements
A9:2017-Using Components with Known Vulnerabilities
API6:2023 - Unrestricted Access to Sensitive Business Flows
A4:2017-XML External Entities (XXE)
API5:2023 - Broken Function Level Authorization
A10:2013-Unvalidated Redirects and Forwards
A1:2013-Injection
A8:2013-Cross-Site Request Forgery (CSRF)
A5:2013-Security Misconfiguration
C2:2018-Leverage Security Frameworks and Libraries
A3:2013-Cross-Site Scripting (XSS)
API10:2023 - Unsafe Consumption of APIs
A6:2017-Security Misconfiguration
A2:2013-Broken Authentication and Session Management
API1:2023 - Broken Object Level Authorization