SQLInjectionInsecureAPIsCryptojackingUnpatchedSoftwareDirectoryTraversalCryptojackingUnpatchedSoftwareSocialEngineeringDirectoryTraversalPhishingCross-SiteScripting(XSS)BackdoorPrivilegeEscalationRansomwareWeakPasswordsMalwareTrojanHorseDenial ofService(DoS)InsiderThreatPhishingDataBreachInsiderThreatRansomwareMan-in-the-Middle(MITM)BufferOverflowBruteForceAttackDDoSAttackCross-SiteScripting(XSS)BackdoorSessionHijackingPhishingBufferOverflowPrivilegeEscalationSessionHijackingWeakPasswordsTrojanHorseZero-DayExploitSocialEngineeringDataBreachSQLInjectionZero-DayExploitRemoteCodeExecution(RCE)BruteForceAttackDenial ofService(DoS)RemoteCodeExecution(RCE)Man-in-the-Middle(MITM)DDoSAttackInsecureAPIsMalwareSQLInjectionInsecureAPIsCryptojackingUnpatchedSoftwareDirectoryTraversalCryptojackingUnpatchedSoftwareSocialEngineeringDirectoryTraversalPhishingCross-SiteScripting(XSS)BackdoorPrivilegeEscalationRansomwareWeakPasswordsMalwareTrojanHorseDenial ofService(DoS)InsiderThreatPhishingDataBreachInsiderThreatRansomwareMan-in-the-Middle(MITM)BufferOverflowBruteForceAttackDDoSAttackCross-SiteScripting(XSS)BackdoorSessionHijackingPhishingBufferOverflowPrivilegeEscalationSessionHijackingWeakPasswordsTrojanHorseZero-DayExploitSocialEngineeringDataBreachSQLInjectionZero-DayExploitRemoteCodeExecution(RCE)BruteForceAttackDenial ofService(DoS)RemoteCodeExecution(RCE)Man-in-the-Middle(MITM)DDoSAttackInsecureAPIsMalware

Patch แตก!แหก!กระจาย!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. SQL Injection
  2. Insecure APIs
  3. Cryptojacking
  4. Unpatched Software
  5. Directory Traversal
  6. Cryptojacking
  7. Unpatched Software
  8. Social Engineering
  9. Directory Traversal
  10. Phishing
  11. Cross-Site Scripting (XSS)
  12. Backdoor
  13. Privilege Escalation
  14. Ransomware
  15. Weak Passwords
  16. Malware
  17. Trojan Horse
  18. Denial of Service (DoS)
  19. Insider Threat
  20. Phishing
  21. Data Breach
  22. Insider Threat
  23. Ransomware
  24. Man-in-the-Middle (MITM)
  25. Buffer Overflow
  26. Brute Force Attack
  27. DDoS Attack
  28. Cross-Site Scripting (XSS)
  29. Backdoor
  30. Session Hijacking
  31. Phishing
  32. Buffer Overflow
  33. Privilege Escalation
  34. Session Hijacking
  35. Weak Passwords
  36. Trojan Horse
  37. Zero-Day Exploit
  38. Social Engineering
  39. Data Breach
  40. SQL Injection
  41. Zero-Day Exploit
  42. Remote Code Execution (RCE)
  43. Brute Force Attack
  44. Denial of Service (DoS)
  45. Remote Code Execution (RCE)
  46. Man-in-the-Middle (MITM)
  47. DDoS Attack
  48. Insecure APIs
  49. Malware