{"version":"1.0","width":620,"height":178,"type":"rich","provider_name":"LISTEN","provider_url":"https:\/\/listen.style","url":"https:\/\/listen.style\/p\/ln51tic8\/ha2usxxu\/player","title":"OWASP_Top10\u304b\u3089\u5b66\u3076\u8a2d\u8a08\u3068\u56de\u5fa9\u529b","author_name":"IT Eng Strategy Method","author_url":"https:\/\/listen.style\/p\/ln51tic8","html":"<iframe src=\"https:\/\/listen.style\/p\/ln51tic8\/ha2usxxu\/player\" title=\"OWASP_Top10\u304b\u3089\u5b66\u3076\u8a2d\u8a08\u3068\u56de\u5fa9\u529b\" scrolling=\"no\" frameborder=\"0\" style=\"width: 100%; height: 178px;\"><a href=\"https:\/\/listen.style\/p\/ln51tic8\/ha2usxxu\/player\">OWASP_Top10\u304b\u3089\u5b66\u3076\u8a2d\u8a08\u3068\u56de\u5fa9\u529b<\/a><\/iframe>"}