{"id":8398,"date":"2022-10-20T12:22:18","date_gmt":"2022-10-20T09:22:18","guid":{"rendered":"https:\/\/www.talentlms.com\/library\/?p=8398"},"modified":"2023-01-19T11:45:54","modified_gmt":"2023-01-19T09:45:54","slug":"application-security-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.talentlms.com\/library\/application-security-vulnerabilities\/","title":{"rendered":"Application Security Vulnerabilities"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":8537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[112],"tags":[27,35],"acf":[],"yoast_head":"\n