GET /api/content/ffceee73-98a5-4adf-8d91-87d1ebeb8402/?format=api
HTTP 200 OK
Allow: GET, POST, PUT, PATCH, DELETE, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "content_customizations": null,
    "shortcut_customizations": [
        {
            "id": 3564,
            "created_at": "2022-11-14T15:26:49.550715Z",
            "updated_at": "2022-11-14T15:26:49.556501Z",
            "action": "DOWNLOAD",
            "color": "#FFFFFF",
            "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/6fdece2004e748349b9d038042e38a53/download_icon.svg",
            "additional_data": {
                "download_url": "https://media.celero.io/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/original_file.pdf"
            },
            "content": 4268
        }
    ],
    "content_thumbnail": {
        "original": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails/1.jpg",
        "high_quality": {
            "small": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/1.jpg",
            "medium": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/1_medium.jpg",
            "large": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/1_large.jpg",
            "microsite_preview": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/preview.jpg"
        }
    },
    "version": {
        "version_number": 1,
        "version_details": {
            "uuid": "ffceee73-98a5-4adf-8d91-87d1ebeb8402",
            "name": "Cyber_CVE_RP",
            "is_live": true,
            "access_control": {
                "min_stage": "EVERYONE_ALLOWED",
                "stage_options": {
                    "UNVERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE",
                        "form_id": "default"
                    },
                    "VERIFIED_CONTACT": {
                        "form_preview": "LANDING_PAGE"
                    },
                    "GDPR_CONSENT": {},
                    "PRIVATE": {},
                    "EVERYONE_ALLOWED": {}
                }
            },
            "base_shorten": null,
            "tags": []
        },
        "is_active": true,
        "type": "DESKTOP",
        "version": "ffceee73-98a5-4adf-8d91-87d1ebeb8402",
        "content_uuid": "ffceee73-98a5-4adf-8d91-87d1ebeb8402",
        "version_id": "ffceee73-98a5-4adf-8d91-87d1ebeb8402"
    },
    "custom_events": [],
    "content_action": null,
    "content_stats": {
        "version": "ffceee73-98a5-4adf-8d91-87d1ebeb8402",
        "visitors_count": 7,
        "lifetime_visitors_count": null,
        "last_seen": "2026-01-19T00:00:00Z",
        "last_updated": "2026-02-22T10:15:45Z",
        "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82"
    },
    "content_meta_tags": {
        "url_title": "cyber-cve-rp",
        "title": "Vulnerability Threat  Intelligence Repor",
        "description": "Vulnerability Threat Intelligence Report In-depth analysis of Common Vulnerabilities and Exposures (CVE) in the past year June 2021 ",
        "og_enabled": true,
        "seo_enabled": true,
        "version": "ffceee73-98a5-4adf-8d91-87d1ebeb8402"
    },
    "keywords": [],
    "seo_content_version_name": "cyber-cve-rp",
    "html_snippets": null,
    "is_live": true,
    "shorten": "https://engage.cognyte.com/s/b0750875/cyber-cve-rp/",
    "base_url": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow",
    "config": {
        "pagecount": 12,
        "bounds": [
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ],
            [
                909,
                1286
            ]
        ]
    },
    "annotations": {
        "pages": [
            {
                "page": 4,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1148,
                            287,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://nvd.nist.gov/vuln/detail/cve-2020-0796"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1164,
                            290,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-19781"
                        }
                    }
                ]
            },
            {
                "page": 5,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1148,
                            290,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1164,
                            289,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-0708"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1180,
                            287,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-1472"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1195,
                            286,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-0199"
                        }
                    }
                ]
            },
            {
                "page": 6,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1131,
                            729,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.cognyte.com/blog/what-you-need-to-know-about-the-top-4-global-ransomware-vulnerabilities-and-how-"
                        }
                    }
                ]
            },
            {
                "page": 7,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1131,
                            764,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/cicada-hacking-group-exploits-zerologon-launches-new-backdoor-in-automotive-industry-attack-"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1164,
                            275,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://us-cert.cisa.gov/ncas/alerts/aa20-283a"
                        }
                    }
                ]
            },
            {
                "page": 8,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1044,
                            682,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1093,
                            714,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            283,
                            1138,
                            558,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1172,
                            223,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://attack.mitre.org/groups/G0096/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            107,
                            1187,
                            228,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://attack.mitre.org/groups/G0016/"
                        }
                    }
                ]
            },
            {
                "page": 9,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1028,
                            737,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1047,
                            397,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            486,
                            1047,
                            358,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.bleepingcomputer.com/news/security/windows-"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1149,
                            448,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1166,
                            567,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            659,
                            1166,
                            185,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.zdnet.com/article/"
                        }
                    }
                ]
            },
            {
                "page": 10,
                "annotations": [
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1105,
                            579,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1141,
                            408,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securelist.com/gaza-cybergang-updated-2017-activity/82765/"
                        }
                    },
                    {
                        "type": "TextLink",
                        "bounds": [
                            80,
                            1175,
                            339,
                            12
                        ],
                        "action": {
                            "type": "URI",
                            "uri": "https://securelist.com/apt-trends-report-q2-2017/79332/"
                        }
                    }
                ]
            }
        ]
    },
    "created_at": "2022-11-14T15:26:49.232529Z",
    "updated_at": "2026-02-22T10:37:34.012689Z",
    "original_name": "Cognyte-CVE-Report.pdf",
    "uuid": "ffceee73-98a5-4adf-8d91-87d1ebeb8402",
    "description": "Vulnerability Threat Intelligence Report In-depth analysis of Common Vulnerabilities and Exposures (CVE) in the past year June 2021 ",
    "is_high_quality_thumbnails_available": true,
    "conversion_type": "DOCUMENT"
}
Shortcut customizations

Lists are not currently supported in HTML input.

Shortcut customizations

Lists are not currently supported in HTML input.