Content Retrieve Api
GET /api/content/ffceee73-98a5-4adf-8d91-87d1ebeb8402/?format=api
{ "content_customizations": null, "shortcut_customizations": [ { "id": 3564, "created_at": "2022-11-14T15:26:49.550715Z", "updated_at": "2022-11-14T15:26:49.556501Z", "action": "DOWNLOAD", "color": "#FFFFFF", "icon_url": "https://app-media-production.s3.amazonaws.com/client_docs/client_documents/557/shortcut_customizations/6fdece2004e748349b9d038042e38a53/download_icon.svg", "additional_data": { "download_url": "https://media.celero.io/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/original_file.pdf" }, "content": 4268 } ], "content_thumbnail": { "original": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails/1.jpg", "high_quality": { "small": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/1.jpg", "medium": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/1_medium.jpg", "large": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/1_large.jpg", "microsite_preview": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow/thumbnails_high_quality/preview.jpg" } }, "version": { "version_number": 1, "version_details": { "uuid": "ffceee73-98a5-4adf-8d91-87d1ebeb8402", "name": "Cyber_CVE_RP", "is_live": true, "access_control": { "min_stage": "EVERYONE_ALLOWED", "stage_options": { "UNVERIFIED_CONTACT": { "form_preview": "LANDING_PAGE", "form_id": "default" }, "VERIFIED_CONTACT": { "form_preview": "LANDING_PAGE" }, "GDPR_CONSENT": {}, "PRIVATE": {}, "EVERYONE_ALLOWED": {} } }, "base_shorten": null, "tags": [] }, "is_active": true, "type": "DESKTOP", "version": "ffceee73-98a5-4adf-8d91-87d1ebeb8402", "content_uuid": "ffceee73-98a5-4adf-8d91-87d1ebeb8402", "version_id": "ffceee73-98a5-4adf-8d91-87d1ebeb8402" }, "custom_events": [], "content_action": null, "content_stats": { "version": "ffceee73-98a5-4adf-8d91-87d1ebeb8402", "visitors_count": 7, "lifetime_visitors_count": null, "last_seen": "2026-01-19T00:00:00Z", "last_updated": "2026-02-22T10:15:45Z", "account": "bb8a3966-0b81-40b5-9d7b-a8cd2a25ee82" }, "content_meta_tags": { "url_title": "cyber-cve-rp", "title": "Vulnerability Threat Intelligence Repor", "description": "Vulnerability Threat Intelligence Report In-depth analysis of Common Vulnerabilities and Exposures (CVE) in the past year June 2021 ", "og_enabled": true, "seo_enabled": true, "version": "ffceee73-98a5-4adf-8d91-87d1ebeb8402" }, "keywords": [], "seo_content_version_name": "cyber-cve-rp", "html_snippets": null, "is_live": true, "shorten": "https://engage.cognyte.com/s/b0750875/cyber-cve-rp/", "base_url": "/users/557/content/b1f00d3227244f8e87ca655c5ad6526f/_JgZA5Ow", "config": { "pagecount": 12, "bounds": [ [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ], [ 909, 1286 ] ] }, "annotations": { "pages": [ { "page": 4, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1148, 287, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/cve-2020-0796" } }, { "type": "TextLink", "bounds": [ 80, 1164, 290, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-19781" } } ] }, { "page": 5, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1148, 290, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-11882" } }, { "type": "TextLink", "bounds": [ 80, 1164, 289, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2019-0708" } }, { "type": "TextLink", "bounds": [ 80, 1180, 287, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2020-1472" } }, { "type": "TextLink", "bounds": [ 80, 1195, 286, 12 ], "action": { "type": "URI", "uri": "https://nvd.nist.gov/vuln/detail/CVE-2017-0199" } } ] }, { "page": 6, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1131, 729, 12 ], "action": { "type": "URI", "uri": "https://www.cognyte.com/blog/what-you-need-to-know-about-the-top-4-global-ransomware-vulnerabilities-and-how-" } } ] }, { "page": 7, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1131, 764, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/cicada-hacking-group-exploits-zerologon-launches-new-backdoor-in-automotive-industry-attack-" } }, { "type": "TextLink", "bounds": [ 80, 1164, 275, 12 ], "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/alerts/aa20-283a" } } ] }, { "page": 8, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1044, 682, 12 ], "action": { "type": "URI", "uri": "https://us-cert.cisa.gov/ncas/current-activity/2020/06/05/unpatched-microsoft-systems-vulnerable-cve-2020-0796" } }, { "type": "TextLink", "bounds": [ 80, 1093, 714, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/" } }, { "type": "TextLink", "bounds": [ 283, 1138, 558, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/ransomware-gang-demands-7-5-million-from-argentinian-isp" } }, { "type": "TextLink", "bounds": [ 80, 1172, 223, 12 ], "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0096/" } }, { "type": "TextLink", "bounds": [ 107, 1187, 228, 12 ], "action": { "type": "URI", "uri": "https://attack.mitre.org/groups/G0016/" } } ] }, { "page": 9, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1028, 737, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/bluekeep-scanner-discovered-in-watchbog-cryptomining-malware/" } }, { "type": "TextLink", "bounds": [ 80, 1047, 397, 12 ], "action": { "type": "URI", "uri": "https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html" } }, { "type": "TextLink", "bounds": [ 486, 1047, 358, 12 ], "action": { "type": "URI", "uri": "https://www.bleepingcomputer.com/news/security/windows-" } }, { "type": "TextLink", "bounds": [ 80, 1149, 448, 12 ], "action": { "type": "URI", "uri": "https://www.seqrite.com/blog/gorgon-apt-targeting-msme-sector-in-india/" } }, { "type": "TextLink", "bounds": [ 80, 1166, 567, 12 ], "action": { "type": "URI", "uri": "https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/" } }, { "type": "TextLink", "bounds": [ 659, 1166, 185, 12 ], "action": { "type": "URI", "uri": "https://www.zdnet.com/article/" } } ] }, { "page": 10, "annotations": [ { "type": "TextLink", "bounds": [ 80, 1105, 579, 12 ], "action": { "type": "URI", "uri": "https://www.sentinelone.com/blog/the-blindingcan-rat-and-malicious-north-korean-activity/" } }, { "type": "TextLink", "bounds": [ 80, 1141, 408, 12 ], "action": { "type": "URI", "uri": "https://securelist.com/gaza-cybergang-updated-2017-activity/82765/" } }, { "type": "TextLink", "bounds": [ 80, 1175, 339, 12 ], "action": { "type": "URI", "uri": "https://securelist.com/apt-trends-report-q2-2017/79332/" } } ] } ] }, "created_at": "2022-11-14T15:26:49.232529Z", "updated_at": "2026-02-22T10:37:34.012689Z", "original_name": "Cognyte-CVE-Report.pdf", "uuid": "ffceee73-98a5-4adf-8d91-87d1ebeb8402", "description": "Vulnerability Threat Intelligence Report In-depth analysis of Common Vulnerabilities and Exposures (CVE) in the past year June 2021 ", "is_high_quality_thumbnails_available": true, "conversion_type": "DOCUMENT" }