Terminology

Term Definition
Bug bounty A reward given for reporting a security vulnerability.
Bug bounty program Companies or individuals that reward security researchers for reporting security vulnerabilities in their products. This term is commonly abbreviated to "BBP".
Bug bounty hunter An individual that hunts for security issues on bug bounty programs.
Duplicate A report describing the same issue as a previously submitted report is referred to as a "duplicate". Bug bounty platforms usually allow programs to set the status of a duplicate report to "duplicate" to inform the hunter that the issue has been submitted previously.
Full disclosure When the entire report is publicly disclosed. Bug bounty hunters will usually request public disclosure of their report once the issue has been resolved or a certain number of days have gone by since the initial report.
Partial disclosure When a report is publicly disclosed, but certain details are redacted.
PoC Abbreviation for proof of concept, a detailed demonstration of a security vulnerability.
Waves This is a term that EdOverflow uses to describe the phenomenon whereby a low-quality report is rewarded on a program, then disclosed, and all of a sudden a ton of programs are flooded with copy-pasted versions of that report.
Scavenging This is another term that EdOverflow uses to refer to hunters that wait for publicly disclosed reports to verify that the patch does in fact resolve the issue; making sure there are no bypasses. This is one good reason for disclosing reports publicly, it allows hunters to double-check your fix.