Vulnerability classifications

Below are some of the vulnerability types we use to classify submissions made to the Bounty program.