DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=21974>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=21974 Runtime exception from DOM2SAX ------- Additional Comments From [EMAIL PROTECTED] 2003-07-29 16:53 ------- There are many places where "malicious code" could break Xalan. Checking for all of them would impose severe performance costs. Frankly, I consider this a case of "if it hurts when you do that, don't do that", and am inclined to close it as WONTFIX... or perhaps even INVALID, since it is not a bug in Xalan but in that other code.
