| 1 | 1.1.4.RELEASE |
| 2 | ============= |
| 3 | - Added ampersand (&) to the list of characters to be escaped in LEVEL 1 for JSON, JavaScript and CSS literals |
| 4 | in order to make escaped code safe against code injection attacks in XHTML scenarios (browsers using XHTML |
| 5 | processing mode) performed by means of including XHTML escape codes in literals. |
| 6 | |
| 7 | 1.1.3.RELEASE |
| 8 | ============= |
| 9 | - Improved performance of String-based unescape methods for HTML, XML, JS, JSON and others when the |
| 10 | text to be unescaped actually needs no unescaping. |
| 11 | |
| 12 | 1.1.2.RELEASE |
| 13 | ============= |
| 14 | - Added support for stream-based (String-to-Writer and Reader-to-Writer) escape and unescape operations. |
| 15 | |
| 16 | 1.1.1.RELEASE |
| 17 | ============= |
| 18 | - Fixed HTML unescape for codepoints > U+10FFFF (was throwing IllegalArgumentException). |
| 19 | - Fixed HTML unescape for codepoints > Integer.MAX_VALUE (was throwing ArrayIndexOutOfBounds). |
| 20 | - Simplified and improved performance of codepoint-computing code by using Character.codePointAt(...) instead |
| 21 | of a complex conditional structure based on Character.isHighSurrogate(...) and Character.isLowSurrogate(...). |
| 22 | - [doc] Fixed description of MSExcel-compatible CSV files. |
| 23 | |
| 24 | |
| 25 | 1.1.0.RELEASE |
| 26 | ============= |
| 27 | - Added URI/URL escape and unescape operations. |
| 28 | |
| 29 | |
| 30 | 1.0 |
| 31 | === |
| 32 | - First release of unbescape. |