📦 Magicos
by Honor
🔍 What is Magicos?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in some Honor products allows attackers to forge system files and overwrite legitimate ones due to improper signature verification. It affects Honor device users who haven't applied...
This CVE describes an incorrect privilege assignment vulnerability in certain Honor products. Successful exploitation could cause device service exceptions, potentially disrupting normal device functi...
This CVE describes an information leak vulnerability affecting certain Honor products. Successful exploitation could allow unauthorized access to sensitive information stored on the device. The vulner...
This CVE describes an information leak vulnerability affecting certain Honor products. Successful exploitation could allow unauthorized access to sensitive information. The vulnerability affects users...
This CVE describes an information leak vulnerability affecting certain Honor products. Successful exploitation could allow unauthorized access to sensitive information stored on affected devices. User...
This CVE describes a file writing vulnerability in certain Honor products that could allow attackers to write arbitrary files to the system. If exploited, this could lead to remote code execution. The...