{"id":2274,"date":"2020-02-25T11:22:53","date_gmt":"2020-02-25T10:22:53","guid":{"rendered":"https:\/\/www.targetinformatica.it\/cve2\/"},"modified":"2020-02-25T11:22:53","modified_gmt":"2020-02-25T10:22:53","slug":"cve2","status":"inherit","type":"attachment","link":"https:\/\/www.targetinformatica.it\/en\/cve2\/","title":{"rendered":"CVE2"},"author":0,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"class_list":["post-2274","attachment","type-attachment","status-inherit","hentry"],"aioseo_notices":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/www.targetinformatica.it\/wp-content\/uploads\/2020\/02\/CVE2.pdf'>CVE2<\/a><\/p>\n"},"caption":{"rendered":"<p>CVE2<\/p>\n"},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{},"post":null,"source_url":"https:\/\/www.targetinformatica.it\/wp-content\/uploads\/2020\/02\/CVE2.pdf","_links":{"self":[{"href":"https:\/\/www.targetinformatica.it\/en\/wp-json\/wp\/v2\/media\/2274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.targetinformatica.it\/en\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.targetinformatica.it\/en\/wp-json\/wp\/v2\/types\/attachment"}],"replies":[{"embeddable":true,"href":"https:\/\/www.targetinformatica.it\/en\/wp-json\/wp\/v2\/comments?post=2274"}]}}