#More_Message {display:none}
#Description { display:inline }
#View_Audience { display:inline }
#Alternate_Terms { display:inline }
#Terminology_Notes { display:inline }
#Time_of_Introduction { display:none }
#Applicable_Platforms { display:none }
#Modes_of_Introduction { display:none }
#Common_Consequences { display:none }
#Likelihood_of_Exploit { display:none }
#Enabling_Factors_for_Exploitation { display:none }
#Detection_Methods { display:none }
#Demonstrative_Examples { display:none }
#Observed_Examples { display:none }
#Potential_Mitigations { display:none }
#Background_Details { display:none }
#Other_Notes { display:none }
#Weakness_Ordinalities { display:none }
#Relationships { display:inline }
#Relationships tr.Weakness { }
#Relationships tr.Category { }
#Relationships tr.Compound_Element { }
#Relationships tr.View { display:none }
#Relationship_Notes { display:inline }
#Research_Gaps { display:none }
#Theoretical_Notes { display:inline }
#Affected_Resources { display:none }
#Relevant_Properties { display:none }
#Functional_Areas { display:none }
#Causal_Nature { display:none }
#Taxonomy_Mappings { display:none }
#Related_Attack_Patterns { display:inline }
#White_Box_Definitions { display:none }
#Black_Box_Definitions { display:none }
#References { display:none }
#Maintenance_Notes { display:none }
#Content_History { display:inline }
#Content_History .Previous_Entry_Names { }
#Content_History .Contributions { display:none }
#Content_History .Submissions { display:none }
#Content_History .Modifications { display:none }
/*graphs */
div.defsummary { display:block }
div.path { display:block }
.graph_title a { font-weight:bold}
