Latest version: v16.0.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
An implementation of the Unicode algorithm for breaking code point sequences into extended grapheme clusters as specified in UAX #29.
No known vulnerabilities found
Has known vulnerabilities