- These were very simple SQL injections that were identified with less effort and attracted decent bounties
- Reporters focused on the exploitation parts and were rewarded for that, which tells us that, in critical vulnerabilities, exploitation is the key