{"id":61,"count":2,"description":"","link":"https:\/\/www.agtech.co.jp\/actian\/faq\/category\/security\/vulnerability\/","name":"\u8106\u5f31\u6027","slug":"vulnerability","taxonomy":"faq_page","parent":60,"meta":[],"_links":{"self":[{"href":"https:\/\/www.agtech.co.jp\/actian\/wp-json\/wp\/v2\/faq_page\/61"}],"collection":[{"href":"https:\/\/www.agtech.co.jp\/actian\/wp-json\/wp\/v2\/faq_page"}],"about":[{"href":"https:\/\/www.agtech.co.jp\/actian\/wp-json\/wp\/v2\/taxonomies\/faq_page"}],"up":[{"embeddable":true,"href":"https:\/\/www.agtech.co.jp\/actian\/wp-json\/wp\/v2\/faq_page\/60"}],"wp:post_type":[{"href":"https:\/\/www.agtech.co.jp\/actian\/wp-json\/wp\/v2\/faq?faq_page=61"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}