#More_Message {display:inline}
#Description { display:inline }
#View_Audience { display:none }
#Alternate_Terms { display:none }
#Terminology_Notes { display:none }
#Time_of_Introduction { display:none }
#Applicable_Platforms { display:inline }
#Modes_of_Introduction { display:none }
#Common_Consequences { display:inline }
#Likelihood_of_Exploit { display:inline }
#Enabling_Factors_for_Exploitation { display:none }
#Detection_Methods { display:none }
#Demonstrative_Examples { display:inline }
#Observed_Examples { display:none }
#Potential_Mitigations { display:inline }
#Background_Details { display:none }
#Other_Notes { display:none }
#Weakness_Ordinalities { display:none }
#Relationships { display:inline }
#Relationship_Notes { display:none }
#Research_Gaps { display:none }
#Theoretical_Notes { display:none }
#Affected_Resources { display:none }
#Relevant_Properties { display:none }
#Functional_Areas { display:none }
#Causal_Nature { display:none }
#Taxonomy_Mappings { display:none }
#Related_Attack_Patterns { display:none }
#White_Box_Definitions { display:none }
#Black_Box_Definitions { display:none }
#References { display:none }
#Maintenance_Notes { display:none }
#Content_History { display:none }

/*
     FILE ARCHIVED ON 04:20:30 Jan 25, 2018 AND RETRIEVED FROM THE
     INTERNET ARCHIVE ON 13:05:13 Jan 01, 2026.
     JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE.

     ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C.
     SECTION 108(a)(3)).
*/
/*
playback timings (ms):
  captures_list: 2.39
  exclusion.robots: 0.023
  exclusion.robots.policy: 0.009
  esindex: 0.013
  cdx.remote: 6.855
  LoadShardBlock: 656.34 (3)
  PetaboxLoader3.resolve: 423.108 (4)
  PetaboxLoader3.datanode: 225.124 (5)
  load_resource: 222.654 (2)
*/