#More_Message {display:inline}
#Description { display:inline }
#View_Audience { display:none }
#Alternate_Terms { display:none }
#Terminology_Notes { display:none }
#Time_of_Introduction { display:none }
#Applicable_Platforms { display:inline }
#Modes_of_Introduction { display:none }
#Common_Consequences { display:inline }
#Likelihood_of_Exploit { display:inline }
#Enabling_Factors_for_Exploitation { display:none }
#Detection_Methods { display:none }
#Demonstrative_Examples { display:inline }
#Observed_Examples { display:none }
#Potential_Mitigations { display:inline }
#Background_Details { display:none }
#Other_Notes { display:none }
#Weakness_Ordinalities { display:none }
#Relationships { display:inline }
#Relationship_Notes { display:none }
#Research_Gaps { display:none }
#Theoretical_Notes { display:none }
#Affected_Resources { display:none }
#Relevant_Properties { display:none }
#Functional_Areas { display:none }
#Causal_Nature { display:none }
#Taxonomy_Mappings { display:none }
#Related_Attack_Patterns { display:none }
#White_Box_Definitions { display:none }
#Black_Box_Definitions { display:none }
#References { display:none }
#Maintenance_Notes { display:none }
#Content_History { display:inline }
