try {
_WidgetManager._HandleControllerResult('BlogArchive1', 'getTitles',{'path': 'https://googleprojectzero.blogspot.com/2021', 'posts': [{'title': 'A deep dive into an NSO zero-click iMessage exploi...', 'url': 'https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html'}, {'title': 'This shouldn\x26#39;t have happened: A vulnerability post...', 'url': 'https://googleprojectzero.blogspot.com/2021/12/this-shouldnt-have-happened.html'}, {'title': 'Windows Exploitation Tricks: Relaying DCOM Authent...', 'url': 'https://googleprojectzero.blogspot.com/2021/10/windows-exploitation-tricks-relaying.html'}, {'title': 'Using Kerberos for Authentication Relay Attacks', 'url': 'https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html'}, {'title': 'How a simple Linux kernel memory corruption bug ca...', 'url': 'https://googleprojectzero.blogspot.com/2021/10/how-simple-linux-kernel-memory.html'}, {'title': 'Fuzzing Closed-Source JavaScript Engines with Cove...', 'url': 'https://googleprojectzero.blogspot.com/2021/09/fuzzing-closed-source-javascript.html'}, {'title': 'Understanding Network Access in Windows AppContainers', 'url': 'https://googleprojectzero.blogspot.com/2021/08/understanding-network-access-windows-app.html'}, {'title': 'An EPYC escape: Case-study of a KVM breakout', 'url': 'https://googleprojectzero.blogspot.com/2021/06/an-epyc-escape-case-study-of-kvm.html'}, {'title': 'Fuzzing iOS code on macOS at native speed', 'url': 'https://googleprojectzero.blogspot.com/2021/05/fuzzing-ios-code-on-macos-at-native.html'}, {'title': 'Designing sockfuzzer, a network syscall fuzzer for...', 'url': 'https://googleprojectzero.blogspot.com/2021/04/designing-sockfuzzer-network-syscall.html'}, {'title': 'Policy and Disclosure: 2021 Edition', 'url': 'https://googleprojectzero.blogspot.com/2021/04/policy-and-disclosure-2021-edition.html'}, {'title': 'Who Contains the Containers?', 'url': 'https://googleprojectzero.blogspot.com/2021/04/who-contains-containers.html'}, {'title': 'In-the-Wild Series: October 2020 0-day discovery', 'url': 'https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html'}, {'title': 'D\xe9j\xe0 vu-lnerability', 'url': 'https://googleprojectzero.blogspot.com/2021/02/deja-vu-lnerability.html'}, {'title': 'A Look at iMessage in iOS 14', 'url': 'https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html'}, {'title': 'Windows Exploitation Tricks: Trapping Virtual Memo...', 'url': 'https://googleprojectzero.blogspot.com/2021/01/windows-exploitation-tricks-trapping.html'}, {'title': 'The State of State Machines', 'url': 'https://googleprojectzero.blogspot.com/2021/01/the-state-of-state-machines.html'}, {'title': 'Hunting for Bugs in Windows Mini-Filter Drivers', 'url': 'https://googleprojectzero.blogspot.com/2021/01/hunting-for-bugs-in-windows-mini-filter.html'}, {'title': 'In-the-Wild Series: Android Post-Exploitation', 'url': 'https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html'}, {'title': 'In-the-Wild Series: Windows Exploits', 'url': 'https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html'}, {'title': 'In-the-Wild Series: Android Exploits', 'url': 'https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html'}, {'title': 'In-the-Wild Series: Chrome Infinity Bug', 'url': 'https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html'}, {'title': 'In-the-Wild Series: Chrome Exploits', 'url': 'https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html'}, {'title': 'Introducing the In-the-Wild Series', 'url': 'https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html'}]});
} catch (e) {
  if (typeof log != 'undefined') {
    log('HandleControllerResult failed: ' + e);
  }
}
