ZeroPath Blog & Research
Explore our team's latest research and stay up to date with ZeroPath's capabilities.

Growatt Cloud Applications at Risk: Unpacking CVE-2025-24297 Stored XSS Vulnerability
A critical stored XSS vulnerability (CVE-2025-24297) in Growatt Cloud Applications allows attackers to inject malicious JavaScript, posing severe risks to user privacy and system integrity.

Oracle Database Java VM Vulnerability CVE-2025-30736: Remote Exploitation Risks and Mitigation
CVE-2025-30736 exposes Oracle Database Java VM to remote unauthenticated attacks, risking critical data integrity and confidentiality. Immediate patching and mitigation strategies are essential.


Oracle E-Business Suite Under Siege: Critical RCE in iSurvey Module (CVE-2025-30727)
A critical remote code execution vulnerability (CVE-2025-30727) has been identified in Oracle E-Business Suite's iSurvey Module, allowing unauthenticated attackers to fully compromise affected systems.

Oracle E-Business Suite Exposed: CVE-2025-30716 Enables Unauthenticated Data Access
A critical vulnerability in Oracle E-Business Suite's CRM User Management Framework (CVE-2025-30716) allows unauthenticated attackers to access sensitive data remotely. Immediate patching is essential.








Critical RCE in BentoML Runner Server: Deep Dive into CVE-2025-32375
An in-depth technical analysis of CVE-2025-32375, a critical remote code execution vulnerability in BentoML's runner server, including exploitation methods, detection techniques, and patching guidance.

React Router Under Siege: Analyzing CVE-2025-31137 URL Spoofing Vulnerability
Dive deep into CVE-2025-31137, a high-severity URL spoofing vulnerability affecting React Router and Remix applications using Express adapters. Learn how attackers exploit HTTP headers and how to protect your applications.




Exploiting Trust: Inside CVE-2025-23120 Veeam Backup & Replication RCE Vulnerability
An in-depth technical breakdown of CVE-2025-23120, a critical remote code execution vulnerability affecting Veeam Backup & Replication, including exploitation methods, detection strategies, and immediate patching guidance.