VestaCP April 5th Exploit
A survey of admins who have VestaCP and what their experience was.
What Version of VestaCP was installed on the compromised host?
Your answer
Was the compromised host configured to use the default VestaCP port for administration (Port 8083)? If not, please specify.
Was the host configured with webmail accessible? eg: https://you-ip/webmail
If you disabled or "removed" the webmail portals such as roundcube, how did you go about it?
Your answer
Never submit passwords through Google Forms.
This form was created inside of NextGI, LLC.. Report Abuse - Terms of Service