A critical DoS vulnerability in the Stacks Clarity virtual machine was exploited via unhandled exceptions in smart contract execution, causing node crashes. The researcher 'Catchme' reported this flaw and received a $76,011 bounty; the fix involved proper error handling instead of relying on `.expect()`.
A researcher discovered a DoS vulnerability in WhatsApp for Android/iOS/Web where a malicious payload embedded in a contact file could crash the victim's phone upon delivery. The vulnerability was patched by Facebook/WhatsApp after ~2 months, and the researcher received a $500 bounty.
Researcher discovered a DoS vulnerability in WhatsApp for iOS and Android by sending specially crafted Unicode characters and emojis in contact names that would crash the application, earning a $500 bounty from Facebook Security.