Animate.css is participating 2021 OSC China Open Source Project Selection , please vote for it!
Animate.css in 2021 OSC China Open Source Project Selection {{projectVoteCount} has been obtained in, please vote for it!
2021 OSC China Open Source Project Selection It is in hot progress. Come and vote for your favorite open source project!
2021 OSC China Open Source Project Selection>>> Midfield Review
Animate.css won the 2021 OSC China Open Source Project Selection "The Best Popularity Project" !
Authorization Agreement MIT
development language HTML/CSS View source code »
operating system Cross platform
Software type Open source software
Open source organizations nothing
region Unknown
deliverer Small editor
intended for unknown
Recording time 2012-04-19

Software Introduction

Animate.css is an interesting, cross browser css3 animation library with many typical css3 animations built in, which is easy to use and compatible.

install

Install using npm:

 $ npm  install animate.css --save

Or use Yarn to install:

 $ yarn  add animate.css

Import it to the file:

 import  'animate.css' ;

Or use CDN to add it directly to the webpage:

 < head >
   < link
     rel = " stylesheet "
     href = " https://cdnjs.cloudflare.com/ajax/libs/animate.css/4.1.1/animate.min.css "
   />
 </ head >

Basic Usage

After Animate.css is installed, the class animate__animated With any Animation Name Add to the element together (don't forget animate__ Prefix!):

 < h1  class = " animate__animated animate__bounce " > An animated element </ h1 >

use @keyframes

You can use the provided animation directly keyframes It provides a flexible way to use Animate.css in the current project without refactoring the HTML code.

example:

 .my-element  {
   display : inline-block ;
   margin : 0 0.5rem ;

   animation : bounce ;  /* referring directly to the animation's @keyframe declaration */
   animation-duration : 2s ;  /* don't forget to set a duration! */
 }

Note that some animations depend on animation-timing Attributes set on the animation class.

Expand to read the full text

code

Gitee index of is
exceed Items for

comment

Click to lead the topic 📣 Post and join the discussion 🔥
No content temporarily
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Issued a question and answer
{{o.pubDate | formatDate}}

{{formatAllHtml(o.title)}}

{{parseInt(o.replyCount) | bigNumberTransform}}
{{parseInt(o.viewCount) | bigNumberTransform}}
No more
No content temporarily
Lodash command injection vulnerability
Code injection
Lodash is a modern JavaScript utility library that provides modularity, performance, and additional functionality. Lodash versions before 4.17.21 are easy to inject commands through template functions.
CVE-2021-23337 MPS-2021-2638
2023-12-20 20:04
Andrey Sitnik postcss denial of service vulnerability
Denial of Service
Andrey Sitnik postcss is a PostCSS tool that uses JS plug-ins to transform styles. There is a regular expression denial of service (ReDoS) vulnerability in the postcss. parse() function of the affected version of the package when parsing source maps.
CVE-2021-23368 MPS-2021-4549
2023-12-20 20:04
Postcss has a regular expression denial of service vulnerability
Denial of Service
Andrey Sitnik postcss is an open source application of Andrey Sitnik, which is used to use JS plug-ins for style conversion. In the vulnerable version, due to the aggressive regular expression, mainly the sub pattern sourceMappingURL=(. *), the program is vulnerable to regular expression denial of service attacks.
CVE-2021-23382 MPS-2021-5409
2023-12-20 20:04
Node server security vulnerability
ReDoS
Npm node server is a library of npm company in the United States. The node server before 7.5.2 has a security vulnerability that is vulnerable to the regular expression denial of service (ReDoS) attack.
CVE-2022-25883 MPS-2022-5166
2023-12-20 20:04
Minimatch Resource Management Error Vulnerability
Denial of Service
Minimatch is a global matcher in javascript for isaacs personal developers. Minimatch has a security vulnerability. The vulnerability is due to the regular expression denial of service (ReDoS) when the braceExpand function is called with specific parameters, resulting in a denial of service.
CVE-2022-3517 MPS-2022-59845
2023-12-20 20:04
Word wrap security vulnerability
ReDoS
Because unsafe regular expressions are used in the result variables, all versions of the word wrap package have a regular expression denial of service (ReDoS) vulnerability. Attackers can use this vulnerability to cause regular expression matching timeout by constructing malicious input, thus leading to system denial of service. It is recommended to upgrade to a fixed version to fix this vulnerability.
CVE-2023-26115 MPS-2023-5109
2023-12-20 20:04
PostCSS security vulnerability
injection
A problem was found before PostCSS 8.4.31. This vulnerability will affect the linter that uses PostCSS to resolve external untrusted CSS. Attackers can prepare CSS in a special way to make it contain parts parsed into CSS comments by PostCSS. After being processed by PostCSS, it will also appear in the PostCSS output in the form of CSS nodes (rules, attributes), even if it is included in comments.
CVE-2023-44270 MPS-y3tx-jzms
2023-12-20 20:04
No more
Loading failed, please refresh the page
Click to load more
Loading
next page
zero comment
ninety-four Collection
 OSCHINA
Log in to view more high-quality content
 Back to top
Top