A5:2013- Security Misconfiguration A6:2017- Security Misconfiguration A6:2013- Sensitive Data Exposure C1:2018- Define Security Requirements C3:2018- Secure Database Access API3:2023 - Broken Object Property Level Authorization A10:2013- Unvalidated Redirects and Forwards A1:2013- Injection A3:2017- Sensitive Data Exposure A7:2013- Missing Function Level Access Control A10:2017- Insufficient Logging & Monitoring API1:2023 - Broken Object Level Authorization A2:2013- Broken Authentication and Session Management A5:2017- Broken Access Control A4:2017- XML External Entities (XXE) C2:2018- Leverage Security Frameworks and Libraries API5:2023 - Broken Function Level Authorization A8:2013- Cross-Site Request Forgery (CSRF) C4:2018- Encode and Escape Data A8:2017- Insecure Deserialization API4:2023 - Unrestricted Resource Consumption A2:2017- Broken Authentication API9:2023 - Improper Inventory Management A4:2013- Insecure Direct Object References A1:2017- Injection API6:2023 - Unrestricted Access to Sensitive Business Flows API8:2023 - Security Misconfiguration A9:2013- Using Components with Known Vulnerabilities API2:2023 - Broken Authentication A9:2017- Using Components with Known Vulnerabilities A7:2017- Cross-Site Scripting (XSS) API6:2023 - Unrestricted Access to Sensitive Business Flows A3:2013- Cross-Site Scripting (XSS) API10:2023 - Unsafe Consumption of APIs A5:2013- Security Misconfiguration A6:2017- Security Misconfiguration A6:2013- Sensitive Data Exposure C1:2018- Define Security Requirements C3:2018- Secure Database Access API3:2023 - Broken Object Property Level Authorization A10:2013- Unvalidated Redirects and Forwards A1:2013- Injection A3:2017- Sensitive Data Exposure A7:2013- Missing Function Level Access Control A10:2017- Insufficient Logging & Monitoring API1:2023 - Broken Object Level Authorization A2:2013- Broken Authentication and Session Management A5:2017- Broken Access Control A4:2017- XML External Entities (XXE) C2:2018- Leverage Security Frameworks and Libraries API5:2023 - Broken Function Level Authorization A8:2013- Cross-Site Request Forgery (CSRF) C4:2018- Encode and Escape Data A8:2017- Insecure Deserialization API4:2023 - Unrestricted Resource Consumption A2:2017- Broken Authentication API9:2023 - Improper Inventory Management A4:2013- Insecure Direct Object References A1:2017- Injection API6:2023 - Unrestricted Access to Sensitive Business Flows API8:2023 - Security Misconfiguration A9:2013- Using Components with Known Vulnerabilities API2:2023 - Broken Authentication A9:2017- Using Components with Known Vulnerabilities A7:2017- Cross-Site Scripting (XSS) API6:2023 - Unrestricted Access to Sensitive Business Flows A3:2013- Cross-Site Scripting (XSS) API10:2023 - Unsafe Consumption of APIs
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
A5:2013-Security Misconfiguration
A6:2017-Security Misconfiguration
A6:2013-Sensitive Data Exposure
C1:2018-Define Security Requirements
C3:2018-Secure Database Access
API3:2023 - Broken Object Property Level Authorization
A10:2013-Unvalidated Redirects and Forwards
A1:2013-Injection
A3:2017-Sensitive Data Exposure
A7:2013-Missing Function Level Access Control
A10:2017-Insufficient Logging & Monitoring
API1:2023 - Broken Object Level Authorization
A2:2013-Broken Authentication and Session Management
A5:2017-Broken Access Control
A4:2017-XML External Entities (XXE)
C2:2018-Leverage Security Frameworks and Libraries
API5:2023 - Broken Function Level Authorization
A8:2013-Cross-Site Request Forgery (CSRF)
C4:2018-Encode and Escape Data
A8:2017-Insecure Deserialization
API4:2023 - Unrestricted Resource Consumption
A2:2017-Broken Authentication
API9:2023 - Improper Inventory Management
A4:2013-Insecure Direct Object References
A1:2017-Injection
API6:2023 - Unrestricted Access to Sensitive Business Flows
API8:2023 - Security Misconfiguration
A9:2013-Using Components with Known Vulnerabilities
API2:2023 - Broken Authentication
A9:2017-Using Components with Known Vulnerabilities
A7:2017-Cross-Site Scripting (XSS)
API6:2023 - Unrestricted Access to Sensitive Business Flows
A3:2013-Cross-Site Scripting (XSS)
API10:2023 - Unsafe Consumption of APIs