try {
_WidgetManager._HandleControllerResult('BlogArchive1', 'getTitles',{'path': 'https://googleprojectzero.blogspot.com/2020', 'posts': [{'title': 'An iOS hacker tries Android', 'url': 'https://googleprojectzero.blogspot.com/2020/12/an-ios-hacker-tries-android.html'}, {'title': 'An iOS zero-click radio proximity exploit odyssey', 'url': 'https://googleprojectzero.blogspot.com/2020/12/an-ios-zero-click-radio-proximity.html'}, {'title': 'Oops, I missed it again!', 'url': 'https://googleprojectzero.blogspot.com/2020/11/oops-i-missed-it-again.html'}, {'title': 'Enter the Vault: Authentication Issues in HashiCor...', 'url': 'https://googleprojectzero.blogspot.com/2020/10/enter-the-vault-auth-issues-hashicorp-vault.html'}, {'title': 'Announcing the Fuzzilli Research Grant Program', 'url': 'https://googleprojectzero.blogspot.com/2020/10/announcing-fuzzilli-research-grant.html'}, {'title': 'Attacking the Qualcomm Adreno GPU', 'url': 'https://googleprojectzero.blogspot.com/2020/09/attacking-qualcomm-adreno-gpu.html'}, {'title': 'JITSploitation I: A JIT Bug', 'url': 'https://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html'}, {'title': 'JITSploitation II: Getting Read/Write', 'url': 'https://googleprojectzero.blogspot.com/2020/09/jitsploitation-two.html'}, {'title': 'JITSploitation III: Subverting Control Flow', 'url': 'https://googleprojectzero.blogspot.com/2020/09/jitsploitation-three.html'}, {'title': 'MMS Exploit Part 5: Defeating Android ASLR, Gettin...', 'url': 'https://googleprojectzero.blogspot.com/2020/08/mms-exploit-part-5-defeating-aslr-getting-rce.html'}, {'title': 'Exploiting Android Messengers with WebRTC: Part 3', 'url': 'https://googleprojectzero.blogspot.com/2020/08/exploiting-android-messengers-part-3.html'}, {'title': 'Exploiting Android Messengers with WebRTC: Part 2', 'url': 'https://googleprojectzero.blogspot.com/2020/08/exploiting-android-messengers-part-2.html'}, {'title': 'MMS Exploit Part 4: MMS Primer, Completing the ASL...', 'url': 'https://googleprojectzero.blogspot.com/2020/08/mms-exploit-part-4-completing-aslr-oracle.html'}, {'title': 'Exploiting Android Messengers with WebRTC: Part 1', 'url': 'https://googleprojectzero.blogspot.com/2020/08/exploiting-android-messengers-part-1.html'}, {'title': 'The core of Apple is PPL: Breaking the XNU kernel\x26#39;...', 'url': 'https://googleprojectzero.blogspot.com/2020/07/the-core-of-apple-is-ppl-breaking-xnu.html'}, {'title': 'One Byte to rule them all', 'url': 'https://googleprojectzero.blogspot.com/2020/07/one-byte-to-rule-them-all.html'}, {'title': 'Root Cause Analyses for 0-day In-the-Wild Exploits', 'url': 'https://googleprojectzero.blogspot.com/2020/07/root-cause-analyses-for-0-day-in-wild.html'}, {'title': 'Detection Deficit: A Year in Review of 0-days Used...', 'url': 'https://googleprojectzero.blogspot.com/2020/07/detection-deficit-year-in-review-of-0.html'}, {'title': 'MMS Exploit Part 3: Constructing the Memory Corrup...', 'url': 'https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-3-constructing-primitives.html'}, {'title': 'MMS Exploit Part 2: Effective Fuzzing of the Qmage...', 'url': 'https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-2-effective-fuzzing-qmage.html'}, {'title': 'MMS Exploit Part 1: Introduction to the Samsung Qm...', 'url': 'https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-1-introduction-to-qmage.html'}, {'title': 'How to unc0ver a 0-day in 4 hours or less', 'url': 'https://googleprojectzero.blogspot.com/2020/07/how-to-unc0ver-0-day-in-4-hours-or-less.html'}, {'title': 'FF Sandbox Escape (CVE-2020-12388)', 'url': 'https://googleprojectzero.blogspot.com/2020/06/ff-sandbox-escape-cve-2020-12388.html'}, {'title': 'A survey of recent iOS kernel exploits', 'url': 'https://googleprojectzero.blogspot.com/2020/06/a-survey-of-recent-ios-kernel-exploits.html'}, {'title': 'Fuzzing ImageIO', 'url': 'https://googleprojectzero.blogspot.com/2020/04/fuzzing-imageio.html'}, {'title': 'You Won\x26#39;t Believe what this One Line Change Did to...', 'url': 'https://googleprojectzero.blogspot.com/2020/04/you-wont-believe-what-this-one-line.html'}, {'title': 'TFW you-get-really-excited-you-patch-diffed-a-0day...', 'url': 'https://googleprojectzero.blogspot.com/2020/04/tfw-you-get-really-excited-you-patch.html'}, {'title': 'Escaping the Chrome Sandbox with RIDL', 'url': 'https://googleprojectzero.blogspot.com/2020/02/escaping-chrome-sandbox-with-ridl.html'}, {'title': 'Mitigations are attack surface, too', 'url': 'https://googleprojectzero.blogspot.com/2020/02/mitigations-are-attack-surface-too.html'}, {'title': 'A day^W^W Several months in the life of Project Ze...', 'url': 'https://googleprojectzero.blogspot.com/2020/02/several-months-in-life-of-part2.html'}, {'title': 'A day^W^W Several months in the life of Project Ze...', 'url': 'https://googleprojectzero.blogspot.com/2020/02/several-months-in-life-of-part1.html'}, {'title': 'Part II: Returning to Adobe Reader symbols on macOS', 'url': 'https://googleprojectzero.blogspot.com/2020/01/part-ii-returning-to-adobe-reader.html'}, {'title': 'Remote iPhone Exploitation Part 3: From Memory Cor...', 'url': 'https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-3.html'}, {'title': 'Remote iPhone Exploitation Part 2: Bringing Light ...', 'url': 'https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-2.html'}, {'title': 'Remote iPhone Exploitation Part 1: Poking Memory v...', 'url': 'https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html'}, {'title': 'Policy and Disclosure: 2020 Edition', 'url': 'https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html'}]});
} catch (e) {
  if (typeof log != 'undefined') {
    log('HandleControllerResult failed: ' + e);
  }
}
