www.vicarius.io Open in urlscan Pro
18.207.30.251  Public Scan

URL: https://www.vicarius.io/research-center/product/kutools-for-excel-id53153_81235
Submission: On January 09 via manual from US — Scanned from DE

Form analysis 3 forms found in the DOM

<form class="form brd-search" data-v-79f87079="">
  <div class="input-field" data-v-a3515fe2="" data-v-79f87079=""><!---->
    <div class="input-holder" data-v-a3515fe2="">
      <div class="input-flex dark" data-v-a3515fe2=""><!----> <input autocomplete="off" type="search" data-hj-allow="" id="input38" name="search" placeholder="Search" value="" class="input-text input-select" data-v-a3515fe2="">
        <div class="prefix suffix" data-v-a3515fe2=""><label for="input38" data-v-a3515fe2=""><svg width="27" height="27" viewBox="0 0 27 27" fill="none" xmlns="http://www.w3.org/2000/svg" data-v-79f87079="" class="">
              <path
                d="M25.9276 23.5837L21.2562 18.9437C24.9036 14.271 24.5199 7.61632 20.3275 3.42368C18.12 1.21619 15.1749 0 12.0401 0C8.90388 0 5.96014 1.21626 3.75278 3.42368C1.54529 5.63117 0.329102 8.57632 0.329102 11.711C0.329102 14.8473 1.54536 17.791 3.75278 19.9984C5.96027 22.2059 8.90542 23.4221 12.0401 23.4221C14.6327 23.4221 17.1928 22.5583 19.2401 20.9258L23.8801 25.6308C24.1676 25.9183 24.5201 26.047 24.9039 26.047C25.2876 26.047 25.6401 25.887 25.9276 25.6308C26.5039 25.087 26.5039 24.1595 25.9276 23.5833L25.9276 23.5837ZM20.8726 11.711C20.8726 14.0785 19.9451 16.2874 18.28 17.951C16.6163 19.6148 14.3764 20.5436 12.04 20.5436C9.70373 20.5436 7.46373 19.6161 5.80005 17.951C4.1363 16.2873 3.20753 14.0474 3.20753 11.711C3.20753 9.34355 4.13502 7.13472 5.80005 5.47104C7.46379 3.8073 9.70373 2.87853 12.04 2.87853C14.4075 2.87853 16.6164 3.80602 18.28 5.47104C19.9438 7.13603 20.8726 9.34368 20.8726 11.711Z"
                fill="#4C4EF0" data-v-79f87079=""></path>
            </svg></label></div> <!----> <!---->
      </div> <!---->
    </div>
  </div>
</form>

<form class="form filter" data-v-1651d871="" data-v-0bbc59dc="">
  <div class="input-field" data-v-4aa73d30="" data-v-1651d871=""><!---->
    <div class="input-flex dark" data-v-4aa73d30=""><!----> <input data-hj-allow="" type="text" id="input51" name="search" placeholder="Search versions" value="" class="input-text" data-v-4aa73d30=""> <!----> <!----></div>
  </div>
</form>

<form class="form contact" data-v-b28b62aa="" data-v-6ca71cba="" data-v-0bbc59dc="">
  <div class="row align-bottom" data-v-b28b62aa="">
    <div class="col col-12 col-md-6 col-lg-auto" data-v-b28b62aa="">
      <div class="input-field" data-v-4aa73d30="" data-v-b28b62aa=""><!---->
        <div class="input-flex dark" data-v-4aa73d30=""><!----> <input data-hj-allow="" type="text" id="input99" name="email" autocomplete="current-name" placeholder="Your Email " value="" class="input-text" data-v-4aa73d30=""> <!----> <!----></div>
      </div>
    </div>
    <div class="col col-12 col-md-6 col-lg-auto" data-v-b28b62aa="">
      <div class="input-field" data-v-4aa73d30="" data-v-b28b62aa=""><!---->
        <div class="input-flex dark" data-v-4aa73d30=""><!----> <input data-hj-allow="" type="text" id="input101" name="name" autocomplete="current-name" placeholder="Your Name" value="" class="input-text" data-v-4aa73d30=""> <!----> <!----></div>
      </div>
    </div>
    <div class="col col-12 col-md-6 col-lg-auto" data-v-b28b62aa="">
      <div class="input-field" data-v-a3515fe2="" data-v-b28b62aa=""><!---->
        <div class="input-holder" data-v-a3515fe2="">
          <div class="input-flex dark" data-v-a3515fe2=""><!----> <input autocomplete="off" type="search" data-hj-allow="" id="input103" placeholder="Contact Reason" class="input-text input-select" data-v-a3515fe2=""> <!----> <!----> <svg width="26"
              height="8" viewBox="0 0 26 8" fill="none" xmlns="http://www.w3.org/2000/svg" data-v-a3515fe2="" class="">
              <path
                d="M25.3536 4.35355C25.5488 4.15829 25.5488 3.84171 25.3536 3.64645L22.1716 0.464466C21.9763 0.269204 21.6597 0.269204 21.4645 0.464466C21.2692 0.659728 21.2692 0.976311 21.4645 1.17157L24.2929 4L21.4645 6.82843C21.2692 7.02369 21.2692 7.34027 21.4645 7.53553C21.6597 7.7308 21.9763 7.7308 22.1716 7.53553L25.3536 4.35355ZM0 4.5H25V3.5H0V4.5Z"
                fill="#4C4EF0" data-v-a3515fe2=""></path>
            </svg></div> <!---->
        </div>
      </div>
    </div>
    <div class="actions col col-12 col-md-6 col-lg-auto" data-v-b28b62aa=""><button type="submit" class="btn btn-blue btn-wide" data-v-b28b62aa=""><span data-v-b28b62aa="">Submit</span>
        <div class="arrow" data-v-b28b62aa=""><span data-v-b28b62aa=""></span></div>
      </button></div>
  </div>
  <div class="row" data-v-b28b62aa="">
    <p class="form-consent col col-12 col-lg-8" data-v-2d001f92="" data-v-b28b62aa=""><span class="consent-icon" data-v-2d001f92=""><svg data-v-2d001f92="" width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"
          class="svg-icon">
          <circle cx="8" cy="8" r="7.5" stroke="#9E9EAC"></circle>
          <rect x="7" y="6" width="2" height="7" rx="1" fill="#9E9EAC"></rect>
          <circle cx="8" cy="4" r="1" fill="#9E9EAC"></circle>
        </svg></span> <span class="consent-text" data-v-2d001f92=""> By submitting this form, you agree to be contacted about TOPIA and other Vicarius products. </span></p>
  </div>
</form>

Text Content

+ Product
+ Solution
Pricing
+ Knowledge
+ Company
Contact
Login
Start Free Trial

Research Center
Kutools for Excel Research Center

Versions 1


Ku



KUTOOLS FOR EXCEL

By Addin Technology

Analyzed by TOPIA



VERSIONS 1

Expand



CVE



http://www.vicarius.io is owned and operated by Vicarius Ltd. (the “Company”).
All information contained on the Website is purely for informational, and
educational purposes and should be independently verified and confirmed.
Vicarius does not accept any liability for any loss or damage whatsoever caused
in reliance upon such information or services. No statements or information
presented in any form by Vicarius is intended as fact, and you agree that you
will not consider the statements or information presented on the Website as fact
or as a guarantee of performance.


SECURITY RESEARCH TOPICS

By Kent Weigle
Mar 10, 2021

FEBRUARY TRENDING CVES: CVE-2021-3156

As stewards of the lush and vast landscape of security vulnerabilities, we felt
obliged to share with you the top trending CVEs of the past month (who's excited
for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go.


By Kent Weigle
Mar 10, 2021

FEBRUARY TRENDING CVES: CVE-2020-1472

As stewards of the lush and vast landscape of security vulnerabilities, we felt
obliged to share with you the top trending CVEs of the past month (who's excited
for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go.


By Kent Weigle
Mar 10, 2021

FEBRUARY TRENDING CVES: CVE-2021-24078

As stewards of the lush and vast landscape of security vulnerabilities, we felt
obliged to share with you the top trending CVEs of the past month (who's excited
for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go.


By Kent Weigle
Feb 01, 2021

TOP TRENDING CVES OF JANUARY 2021

Well, we made it through the first month of 2021! (Hopefully without any
scratches or bruises 😅). As stewards of the lush and vast landscape of security
vulnerabilities, we felt obliged to share with you the top trending CVEs of the
past month. So, without further ado, The Top Trending CVEs of January 2021:


By Kent Weigle
Dec 22, 2020

SECURITY VULNERABILITY EXAMPLES

As the threat landscape changes, the ability to address the most common types of
security vulnerabilities is vital for robust protection. As information becomes
the most essential asset for an organization, cybersecurity gains much more
importance. To successfully conduct your business and preserve the hard-earned
reputation of your company, you need to protect your data from malicious
attacks, data breaches and hackers. 


By Kent Weigle
Dec 22, 2020

ZOOM SECURITY VULNERABILITIES

As if times haven’t been hard enough, businesses are dealing with new security
threats while employees work from home and some have major issues with one of
the most popular video conferencing platforms, Zoom.


By Kent Weigle
Dec 22, 2020

WHAT IS A VULNERABILITY?

This article will offer a quick guide to vulnerabilities – what they are, how
they can be exploited and the consequences of exploitation. A vulnerability is a
weakness in an asset that can be exploited by cyber attackers. It’s a known
issue that allows an attack to succeed. 


By Kent Weigle
Dec 21, 2020

TOP 10 SOFTWARE VULNERABILITIES

Security testing is an assessment of the sensitivity of a software vulnerability
to various attacks. What type of attacks? Mainly unauthorized breaches into the
system with the aim of extracting data about users or getting confidential
information. With the help of vulnerabilities present in the software code,
attackers can achieve their objectives.  


By Kent Weigle
Dec 21, 2020

ZERO-DAY VULNERABILITY: DEFENSE STRATEGIES

A zero-day is a weakness in hardware, software or firmware that is not known to
the parties responsible for patching or fixing the flaw. The term zero refers to
an attack that has zero days between the time the vulnerability is discovered
and the first attack. Once a zero-day vulnerability is known to the public, it’s
known as a one-day or n-day vulnerability.






START CLOSING SECURITY GAPS

 * 
   Risk reduction from Day 1
 * 
   Fast set-up and deployment
 * 
   Unified platform
 * 
   Full-featured 30-day trial

See TOPIA in Live!
Start Free Trial!


HAVE QUESTIONS?

Submit


By submitting this form, you agree to be contacted about TOPIA and other
Vicarius products.

TOPIA is a consolidated vulnerability management platform that protects assets
in real time. Its rich, integrated features efficiently pinpoint and remediate
the largest risks to your cyber infrastructure. Resolve the most pressing
threats with efficient automation features and precise contextual analysis.

We're hiring!

SUPPORT

support@vicarius.io

SALES

sales@vicarius.io

MARKETING

info@vicarius.io
Product
Product Overview
Patch Management
Patchless Protection
Auto Actions
xTags
0-Day Detection
Solution
Solution Overview
Case Studies
Knowledge
Research Center
Apps & OS Patch Catalog
Videos
Articles
Docs
Company
About
Investors
Partners
Trust
Careers
Pricing
Pricing




Copyright © Vicarius. All rights reserved 2021. Privacy Policy and Terms of Use




We use cookies to enhance your experience while on our website, serve
personalized content, provide social media features and to optimize our traffic.
By continuing to browse the site you are agreeing to our use of cookies. More
info

Decline Accept