www.vicarius.io
Open in
urlscan Pro
18.207.30.251
Public Scan
URL:
https://www.vicarius.io/research-center/product/kutools-for-excel-id53153_81235
Submission: On January 09 via manual from US — Scanned from DE
Submission: On January 09 via manual from US — Scanned from DE
Form analysis
3 forms found in the DOM<form class="form brd-search" data-v-79f87079="">
<div class="input-field" data-v-a3515fe2="" data-v-79f87079=""><!---->
<div class="input-holder" data-v-a3515fe2="">
<div class="input-flex dark" data-v-a3515fe2=""><!----> <input autocomplete="off" type="search" data-hj-allow="" id="input38" name="search" placeholder="Search" value="" class="input-text input-select" data-v-a3515fe2="">
<div class="prefix suffix" data-v-a3515fe2=""><label for="input38" data-v-a3515fe2=""><svg width="27" height="27" viewBox="0 0 27 27" fill="none" xmlns="http://www.w3.org/2000/svg" data-v-79f87079="" class="">
<path
d="M25.9276 23.5837L21.2562 18.9437C24.9036 14.271 24.5199 7.61632 20.3275 3.42368C18.12 1.21619 15.1749 0 12.0401 0C8.90388 0 5.96014 1.21626 3.75278 3.42368C1.54529 5.63117 0.329102 8.57632 0.329102 11.711C0.329102 14.8473 1.54536 17.791 3.75278 19.9984C5.96027 22.2059 8.90542 23.4221 12.0401 23.4221C14.6327 23.4221 17.1928 22.5583 19.2401 20.9258L23.8801 25.6308C24.1676 25.9183 24.5201 26.047 24.9039 26.047C25.2876 26.047 25.6401 25.887 25.9276 25.6308C26.5039 25.087 26.5039 24.1595 25.9276 23.5833L25.9276 23.5837ZM20.8726 11.711C20.8726 14.0785 19.9451 16.2874 18.28 17.951C16.6163 19.6148 14.3764 20.5436 12.04 20.5436C9.70373 20.5436 7.46373 19.6161 5.80005 17.951C4.1363 16.2873 3.20753 14.0474 3.20753 11.711C3.20753 9.34355 4.13502 7.13472 5.80005 5.47104C7.46379 3.8073 9.70373 2.87853 12.04 2.87853C14.4075 2.87853 16.6164 3.80602 18.28 5.47104C19.9438 7.13603 20.8726 9.34368 20.8726 11.711Z"
fill="#4C4EF0" data-v-79f87079=""></path>
</svg></label></div> <!----> <!---->
</div> <!---->
</div>
</div>
</form>
<form class="form filter" data-v-1651d871="" data-v-0bbc59dc="">
<div class="input-field" data-v-4aa73d30="" data-v-1651d871=""><!---->
<div class="input-flex dark" data-v-4aa73d30=""><!----> <input data-hj-allow="" type="text" id="input51" name="search" placeholder="Search versions" value="" class="input-text" data-v-4aa73d30=""> <!----> <!----></div>
</div>
</form>
<form class="form contact" data-v-b28b62aa="" data-v-6ca71cba="" data-v-0bbc59dc="">
<div class="row align-bottom" data-v-b28b62aa="">
<div class="col col-12 col-md-6 col-lg-auto" data-v-b28b62aa="">
<div class="input-field" data-v-4aa73d30="" data-v-b28b62aa=""><!---->
<div class="input-flex dark" data-v-4aa73d30=""><!----> <input data-hj-allow="" type="text" id="input99" name="email" autocomplete="current-name" placeholder="Your Email " value="" class="input-text" data-v-4aa73d30=""> <!----> <!----></div>
</div>
</div>
<div class="col col-12 col-md-6 col-lg-auto" data-v-b28b62aa="">
<div class="input-field" data-v-4aa73d30="" data-v-b28b62aa=""><!---->
<div class="input-flex dark" data-v-4aa73d30=""><!----> <input data-hj-allow="" type="text" id="input101" name="name" autocomplete="current-name" placeholder="Your Name" value="" class="input-text" data-v-4aa73d30=""> <!----> <!----></div>
</div>
</div>
<div class="col col-12 col-md-6 col-lg-auto" data-v-b28b62aa="">
<div class="input-field" data-v-a3515fe2="" data-v-b28b62aa=""><!---->
<div class="input-holder" data-v-a3515fe2="">
<div class="input-flex dark" data-v-a3515fe2=""><!----> <input autocomplete="off" type="search" data-hj-allow="" id="input103" placeholder="Contact Reason" class="input-text input-select" data-v-a3515fe2=""> <!----> <!----> <svg width="26"
height="8" viewBox="0 0 26 8" fill="none" xmlns="http://www.w3.org/2000/svg" data-v-a3515fe2="" class="">
<path
d="M25.3536 4.35355C25.5488 4.15829 25.5488 3.84171 25.3536 3.64645L22.1716 0.464466C21.9763 0.269204 21.6597 0.269204 21.4645 0.464466C21.2692 0.659728 21.2692 0.976311 21.4645 1.17157L24.2929 4L21.4645 6.82843C21.2692 7.02369 21.2692 7.34027 21.4645 7.53553C21.6597 7.7308 21.9763 7.7308 22.1716 7.53553L25.3536 4.35355ZM0 4.5H25V3.5H0V4.5Z"
fill="#4C4EF0" data-v-a3515fe2=""></path>
</svg></div> <!---->
</div>
</div>
</div>
<div class="actions col col-12 col-md-6 col-lg-auto" data-v-b28b62aa=""><button type="submit" class="btn btn-blue btn-wide" data-v-b28b62aa=""><span data-v-b28b62aa="">Submit</span>
<div class="arrow" data-v-b28b62aa=""><span data-v-b28b62aa=""></span></div>
</button></div>
</div>
<div class="row" data-v-b28b62aa="">
<p class="form-consent col col-12 col-lg-8" data-v-2d001f92="" data-v-b28b62aa=""><span class="consent-icon" data-v-2d001f92=""><svg data-v-2d001f92="" width="16" height="16" viewBox="0 0 16 16" fill="none" xmlns="http://www.w3.org/2000/svg"
class="svg-icon">
<circle cx="8" cy="8" r="7.5" stroke="#9E9EAC"></circle>
<rect x="7" y="6" width="2" height="7" rx="1" fill="#9E9EAC"></rect>
<circle cx="8" cy="4" r="1" fill="#9E9EAC"></circle>
</svg></span> <span class="consent-text" data-v-2d001f92=""> By submitting this form, you agree to be contacted about TOPIA and other Vicarius products. </span></p>
</div>
</form>
Text Content
+ Product + Solution Pricing + Knowledge + Company Contact Login Start Free Trial Research Center Kutools for Excel Research Center Versions 1 Ku KUTOOLS FOR EXCEL By Addin Technology Analyzed by TOPIA VERSIONS 1 Expand CVE http://www.vicarius.io is owned and operated by Vicarius Ltd. (the “Company”). All information contained on the Website is purely for informational, and educational purposes and should be independently verified and confirmed. Vicarius does not accept any liability for any loss or damage whatsoever caused in reliance upon such information or services. No statements or information presented in any form by Vicarius is intended as fact, and you agree that you will not consider the statements or information presented on the Website as fact or as a guarantee of performance. SECURITY RESEARCH TOPICS By Kent Weigle Mar 10, 2021 FEBRUARY TRENDING CVES: CVE-2021-3156 As stewards of the lush and vast landscape of security vulnerabilities, we felt obliged to share with you the top trending CVEs of the past month (who's excited for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go. By Kent Weigle Mar 10, 2021 FEBRUARY TRENDING CVES: CVE-2020-1472 As stewards of the lush and vast landscape of security vulnerabilities, we felt obliged to share with you the top trending CVEs of the past month (who's excited for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go. By Kent Weigle Mar 10, 2021 FEBRUARY TRENDING CVES: CVE-2021-24078 As stewards of the lush and vast landscape of security vulnerabilities, we felt obliged to share with you the top trending CVEs of the past month (who's excited for winter to be over?! 😁☀️🌷). Brace yourself! Ok, here we go. By Kent Weigle Feb 01, 2021 TOP TRENDING CVES OF JANUARY 2021 Well, we made it through the first month of 2021! (Hopefully without any scratches or bruises 😅). As stewards of the lush and vast landscape of security vulnerabilities, we felt obliged to share with you the top trending CVEs of the past month. So, without further ado, The Top Trending CVEs of January 2021: By Kent Weigle Dec 22, 2020 SECURITY VULNERABILITY EXAMPLES As the threat landscape changes, the ability to address the most common types of security vulnerabilities is vital for robust protection. As information becomes the most essential asset for an organization, cybersecurity gains much more importance. To successfully conduct your business and preserve the hard-earned reputation of your company, you need to protect your data from malicious attacks, data breaches and hackers. By Kent Weigle Dec 22, 2020 ZOOM SECURITY VULNERABILITIES As if times haven’t been hard enough, businesses are dealing with new security threats while employees work from home and some have major issues with one of the most popular video conferencing platforms, Zoom. By Kent Weigle Dec 22, 2020 WHAT IS A VULNERABILITY? This article will offer a quick guide to vulnerabilities – what they are, how they can be exploited and the consequences of exploitation. A vulnerability is a weakness in an asset that can be exploited by cyber attackers. It’s a known issue that allows an attack to succeed. By Kent Weigle Dec 21, 2020 TOP 10 SOFTWARE VULNERABILITIES Security testing is an assessment of the sensitivity of a software vulnerability to various attacks. What type of attacks? Mainly unauthorized breaches into the system with the aim of extracting data about users or getting confidential information. With the help of vulnerabilities present in the software code, attackers can achieve their objectives. By Kent Weigle Dec 21, 2020 ZERO-DAY VULNERABILITY: DEFENSE STRATEGIES A zero-day is a weakness in hardware, software or firmware that is not known to the parties responsible for patching or fixing the flaw. The term zero refers to an attack that has zero days between the time the vulnerability is discovered and the first attack. Once a zero-day vulnerability is known to the public, it’s known as a one-day or n-day vulnerability. START CLOSING SECURITY GAPS * Risk reduction from Day 1 * Fast set-up and deployment * Unified platform * Full-featured 30-day trial See TOPIA in Live! Start Free Trial! HAVE QUESTIONS? Submit By submitting this form, you agree to be contacted about TOPIA and other Vicarius products. TOPIA is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis. We're hiring! SUPPORT support@vicarius.io SALES sales@vicarius.io MARKETING info@vicarius.io Product Product Overview Patch Management Patchless Protection Auto Actions xTags 0-Day Detection Solution Solution Overview Case Studies Knowledge Research Center Apps & OS Patch Catalog Videos Articles Docs Company About Investors Partners Trust Careers Pricing Pricing Copyright © Vicarius. All rights reserved 2021. Privacy Policy and Terms of Use We use cookies to enhance your experience while on our website, serve personalized content, provide social media features and to optimize our traffic. By continuing to browse the site you are agreeing to our use of cookies. More info Decline Accept