Home Product Support Platforms GCOS7 Software Keys

Software Keys

List of available Software Keys items.

 

List of available Software Keys items.
Short Name Title Description Modification Date
ex-7-729-01-00-whql_mr7-29_windows_driver File EX-7.729.01.00-WHQL_MR7.29_Windows_Driver 2024/07/19 19:06:48 GMT+2
ex-lsi-megaraid-9540-16i-1758558 File EX-lsi-megaraid-9540-16i-1758558 2024/07/19 19:06:49 GMT+2
ex-lsi-megaraid-9540-2m2-1778644 File EX-lsi-megaraid-9540-2m2-1778644 2024/07/19 19:06:48 GMT+2
ex-vroc_8-0-0-4035_win_releasepackage File EX-VROC_8.0.0.4035_Win_Releasepackage 2024/07/19 19:06:49 GMT+2
carmen-anpr-7-3-1.23 File Carmen ANPR 7.3.1.23 Drivers for Ipsotek Dongle, for windows and Linux 2024/07/19 19:06:35 GMT+2
vulnerabilities-fixed-in-mesca3-psirt-736-tlp-clear-version-2-7-cve-2003-0001-cve-2015-3200-cve-2018-19052-cve-2018-25183-cve-2019-11072-cve-2021-36369-cve-2022... File Vulnerabilities fixed in Mesca3 - PSIRT-736 - TLP:CLEAR - Version: 2.7 - CVE-2003-0001 CVE-2015-3200 CVE-2018-19052 CVE-2018-25183 CVE-2019-11072 CVE-2021-36369 CVE-2022-01292 CVE-2022-21166 CVE-2022-22707 CVE-2022-30780 CVE-2022-37797 CVE-2022-40982 CVE-2022-41556 CVE-2023-00464 This bulletin covers vulnerabilities fixed in a new technical state (TS 74) for Mesca3 based platforms. It is prepared to support delivery of this new TS. The f... 2024/07/19 18:45:27 GMT+2
bullsequana-edge-sound-level-measurements-protocol File BullSequana Edge Sound Level Measurements Protocol This document describes the protocol for measuring BullSequana Edge machine sound level on customer’s site 2024/07/18 15:07:48 GMT+2
server_driver_intel_vroc_8-5-0.1593 File server_driver_intel_vroc_8.5.0.1593 server_driver_intel_vroc_8.5.0.1593 2024/07/17 15:04:30 GMT+2
server_driver_intel_qat2-0-w-2-0-1-0016 File SA1 - server_driver_intel_QAT2.0.W.2.0.1-0016 server_driver_intel_QAT2.0.W.2.0.1-0016 2024/07/15 14:01:15 GMT+2
server_driver_chipset_amd_4-06-27.500 File SA1 - server_driver_chipset_amd_4.06.27.500 server_driver_chipset_amd_4.06.27.500 2024/07/15 14:01:46 GMT+2
server_driver_intel_vroc_8-0-0.4035 File SA1 - server_driver_intel_vroc_8.0.0.4035 server_driver_intel_vroc_8.0.0.4035 2024/07/15 14:00:13 GMT+2
SA1 - server_driver_intel_lan_27.8 File SA1 - server_driver_intel_lan_27.8 server_driver_intel_lan_27.8 2024/07/15 13:57:02 GMT+2
server_driver_vga_aspeed_v1.14 File SA1 - server_driver_vga_aspeed_v1.14 server_driver_vga_aspeed_v1.14 5 (v114_windows) 2024/07/15 13:57:51 GMT+2
server_driver_chipset_intel_10-1-19263.8344 File SA1 - server_driver_chipset_intel_10.1.19263.8344 server_driver_chipset_intel_10.1.19263.8344 2024/07/15 13:57:48 GMT+2
rce-vulnerability-in-openssh-server-psirt-1395-tlp-clear-version-0-2-cve-2024-6387-cve-2024-6409 File RCE Vulnerability in OpenSSH server - PSIRT-1395 - TLP:CLEAR - Version: 0.2 - CVE-2024-6387 CVE-2024-6409 A Remote Unauthenticated Code Execution (RCE) vulnerability in OpenSSH's server (sshd) has been uncovered by the Qualys Threat Research Unit (TRU) on glibc-base... 2024/07/12 17:35:29 GMT+2
ami-aptiov-vulnerabilities-ami-sa-2023007-and-ami-sa-2023008-psirt-673-tlp-clear-version-0-5-cve-2023-34469-cve-2023-34470-cve-2023-39535-cve-2023-39536-cve-202... File AMI AptioV vulnerabilities - AMI-SA-2023007 and AMI-SA-2023008 - PSIRT-673 - TLP:CLEAR - Version: 0.5 - CVE-2023-34469, CVE-2023-34470, CVE-2023-39535, CVE-2023-39536, CVE-2023-39537 AMI's PSIRT has taken action in response to a security notification regarding possible vulnerabilities in Aptio V. After conducting a thorough investigation, AM... 2024/07/12 17:27:45 GMT+2
gcos7-last-news-bulletin-of-july-2024 File GCOS7-last-news-bulletin-of-July-2024 2024/07/12 15:37:02 GMT+2
index.htm B-Multilingual document Emulators 2024/07/04 15:15:24 GMT+2
index.htm B-Multilingual document Emulators/Glink 2024/07/04 14:53:28 GMT+2
index.htm B-Multilingual document GateWay/Hostlinks 2024/07/04 14:42:05 GMT+2
Assistance request
Create and track
Bull Search