
M6
L'actualité des programmes M6



L'actualité des programmes M6

With around 10,500 employees and over 500 brands world-wide, Hubert Burda Media is one of Germany’s largest technology and media companies. We create media with people, for people. We use our social relevance to make a difference and offer our employees the freedom to be creative and to invent new things. That is why working at Burda means: working "...in good company". All our business activities focus on our consumers, offering them reliable information, helpful services and great entertainment. We have strong media and digital brands in the News, Tech, Food, Living, Gardening, Fashion, Lifestyle, Health and Entertainment segments. We are active in 13 markets across Europe, Asia, and the United States. A family enterprise with a history spanning over 100 years, Burda combines traditional publishing with successful digital innovation and also invests in digital business models to ensure their long-term success. Examples include Xing, Nebenan.de and Vinted. Our digital activities also include journalism services such as Focus Online and Chip.de. We strive to actively shape the changes taking place in the media world. Our employees are as diverse as our company, technologies and media. If you have an entrepreneurial mindset, can take responsibility, and enjoy working in a team to drive innovation, Burda is the right place for you. Join us: https://www.burda.com/en/career/
Security & Compliance Standards Overview












No incidents recorded for M6 in 2025.
No incidents recorded for Hubert Burda Media in 2025.
M6 cyber incidents detection timeline including parent company and subsidiaries
Hubert Burda Media cyber incidents detection timeline including parent company and subsidiaries
The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘percentage’ parameter in all versions up to, and including, 5.4.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
The ComboServlet in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.2, 2023.Q3.1 through 2023.Q3.5, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions does not limit the number or size of the files it will combine, which allows remote attackers to create very large responses that lead to a denial of service attack via the URL query string.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and create arbitrary directories on the target machine.
A relative path traversal vulnerability was discovered in Productivity Suite software version 4.4.1.19. The vulnerability allows an unauthenticated remote attacker to interact with the ProductivityService PLC simulator and delete arbitrary files on the target machine.