
M6
L'actualité des programmes M6



L'actualité des programmes M6

Glamour is a women's magazine published by Condé Nast Publications. Founded in 1939 in the United States, it was originally called Glamour of Hollywood. Glamour covers the stories women want—and need—to read right now, with high-quality journalism and an authentic, accessible point of view. Here, you’ll find up-to-the-instant coverage of the issues affecting women’s lives—from politics to #MeToo; fashion that is attainable; beauty—both inside and out—and a holistic approach to wellness; sex and relationships; as well as the TV, movies, books, and pop culture you’re obsessed with. Local editions are now published in numerous countries including the United Kingdom, United States, France, Italy, Germany, Spain, Russia, Greece, Poland, South Africa, Brazil, Hungary, Romania, Bulgaria, Netherlands, Mexico. In most cases it is a monthly publication.
Security & Compliance Standards Overview












No incidents recorded for M6 in 2025.
No incidents recorded for Glamour in 2025.
M6 cyber incidents detection timeline including parent company and subsidiaries
Glamour cyber incidents detection timeline including parent company and subsidiaries
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.