Ethical hackers often perform "penetration testing" or "ethical hacking," attempting to exploit vulnerabilities in controlled environments to prove their existence and determine their severity.
Reporting:
Once a vulnerability is discovered, the researcher reports the findings to the organization running the bug bounty program