VestaCP April 5th Exploit
A survey of admins who have VestaCP and what their experience was.
What Version of VestaCP was installed on the compromised host?
Was the compromised host configured to use the default VestaCP port for administration (Port 8083)? If not, please specify.
Was the host configured with webmail accessible? eg:
If you disabled or "removed" the webmail portals such as roundcube, how did you go about it?
Page 1 of 3
Never submit passwords through Google Forms.
This form was created inside of NextGI, LLC..
Terms of Service