In Chapter 8, Access Control and Security Through Obscurity, as part of our discussion about access control, security by obscurity, and data leakage, we briefly covered different types of data that companies weren't interested in rewarding: usernames, descriptive-but-not-sensitive error messages, different kinds of error codes, and so on.
Here are some other, specific examples about information that security researchers often report, but that companies very rarely pay for.