This Metasploit module allows an attacker with an unprivileged windows account to gain admin access on windows system and start a shell. For this module to work, both the NSClient++ web interface and ExternalScripts features must be enabled. You must also know where the NSClient config file is, as it is used to read the admin password which is stored in clear text.
2f48ecb1ace9ab98da3fc097c685134fbbff745e68f82e7a48130c2319a63541
This Metasploit module allows an attacker with knowledge of the admin password of NSClient++ to start a privileged shell. For this module to work, both web interface of NSClient++ and ExternalScripts feature should be enabled.
e95945a965159bfea31fbd8366718d83da086d569e817f49987fd013571a676d
NSClient++ version 0.5.2.35 suffers from an authenticated remote code execution vulnerability.
053705c2b596c7f38b7eb30e3af51eec6fef0aeb113ab9277200a3f98bf4b2f9
ManageEngine opManager version 12.3.150 suffers from an authenticated code execution vulnerability.
c781bae6fabc777885b6eae0ac9be3822aea65830c26c680033ec1ce68cb9cc2