function CartCrossSellsSummaryHeight(){const e=document.querySelector("body"),t=document.querySelector(".cross-sells");if(e.classList.contains("woocommerce-cart")&&t){const r=t.querySelectorAll(".products > li");r&&r.forEach(e=>{if(e){const t=e.querySelectorAll(".astra-shop-summary-wrap");t&&t.forEach(e=>{var t=e.querySelector(".price"),r=e.querySelector("a.button"),o=e.querySelector("a.ast-quick-view-button");(t||r)&&(t=(t?t.clientHeight:0)+(r?r.clientHeight:0)+(o?o.clientHeight:0)+15)&&(e.style.minHeight=t+"px")})}})}}function CartCrossSellsSummaryHeightResize(){let t;window.addEventListener("resize",function(e){clearTimeout(t),t=setTimeout(function(){CartCrossSellsSummaryHeight()},500)})}window.addEventListener("DOMContentLoaded",e=>{CartCrossSellsSummaryHeight()}),CartCrossSellsSummaryHeightResize(); { "name": "symfony/polyfill-intl-idn", "type": "library", "description": "Symfony polyfill for intl's idn_to_ascii and idn_to_utf8 functions", "keywords": ["polyfill", "shim", "compatibility", "portable", "intl", "idn"], "homepage": "https://symfony.com", "license": "MIT", "authors": [ { "name": "Laurent Bassin", "email": "laurent@bassin.info" }, { "name": "Trevor Rowbotham", "email": "trevor.rowbotham@pm.me" }, { "name": "Symfony Community", "homepage": "https://symfony.com/contributors" } ], "require": { "php": ">=5.3.3", "symfony/polyfill-intl-normalizer": "^1.10", "symfony/polyfill-php70": "^1.10", "symfony/polyfill-php72": "^1.10" }, "autoload": { "psr-4": { "Symfony\\Polyfill\\Intl\\Idn\\": "" }, "files": [ "bootstrap.php" ] }, "suggest": { "ext-intl": "For best performance" }, "minimum-stability": "dev", "extra": { "branch-alias": { "dev-main": "1.19-dev" }, "thanks": { "name": "symfony/polyfill", "url": "https://github.com/symfony/polyfill" } } } GitHub Repositories Hit by Password-Stealing Commits Disguised as Dependabot Contributions | Quike Fix We Fix Every Thing

A new malicious campaign has been observed hijacking GitHub accounts and committing malicious code disguised as Dependabot contributions with an aim to steal passwords from developers.
“The malicious code exfiltrates the GitHub project’s defined secrets to a malicious C2 server and modify any existing javascript files in the attacked project with a web-form password-stealer malware code