Poorly written XML parsers (and I've written my fair share) are always open to DOS attacks; XML has no upper bound on element names, attribute value length, stack depth ...<p><a href="http://en.wikipedia.org/wiki/Billion_laughs" rel="nofollow">http://en.wikipedia.org/wiki/Billion_laughs</a><p>Same is mostly true of JSON parsers as well of course.<p>If you let potentially hostile users feed arbitrary data into any of these, even a totally non-buggy, perfectly conformant parser is wide-open to being abused via DOS.