Below are some of the vulnerability types we used to classify submissions made to the Bug Bounty program prior to our shift to the HackerOne platform. For a recent list of our Bounty researchers, check out our HackerOne leaderboard.