Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from domain name (e.g. zvpprsensinaix.com for Banjori malware), URL (e.g. http://109.162.38.120/harsh02.exe for known malicious executable), IP address (e.g. 185.130.5.231 for […]
maltrail – Malicious Traffic Detection System
Recent Posts
- CVE-2024-13434 – “WordPress WP Inventory Manager Reflected Cross-Site Scripting Vulnerability”
- CVE-2024-13401 – “PayPal WordPress Stored Cross-Site Scripting Vulnerability”
- CVE-2024-13398 – PayPal Checkout for WordPress Stored Cross-Site Scripting
- CVE-2024-51462 – IBM QRadar WinCollect Agent XML Injection Vulnerability
- CVE-2024-52363 – IBM InfoSphere Information Server Directory Traversal Vulnerability