The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811
http://secunia.com/advisories/59427
http://lists.opensuse.org/opensuse-updates/2014-06/msg00043.html