Jump to content

WMP10 Complete Slipstream


Recommended Posts

Hello,

every time i try to download the WMP10_Slipstreamer_v3.zip file, the DAP asking for a user name and password, can you help ?

midocity

LATEST VERSION: 3

CREDIT:

Bâshrat the Sneaky and Obliviator they've done the most work.

CHECK OUT THEIR POSTS:

BTS WMP10 Slipstreamer

Obliviator WMP10 Slipstream

djbe: FEDIT program used to add entries to various i386 files.(provided to me by BTS)

Also boooggy: Thanks for all the testing and info !!! :thumbup

Everyone else who helped out and opted to host for me.. Thanks!

[

DOWNLOAD LINK

Slipstreamer V3 Download (340KB). THANK YOU Ben.Hahlen for the download! :)

Slipstreamer V3 Alternate Download Mirror. Thanks RyanVM ;)

Changes: Check out the changes.txt file included.. But the sysoc.inf bug should be fixed!

Link to comment
Share on other sites


  • 2 weeks later...

Hi,

is there a way to slipstream WMP 10 +the following updates?

windowsmedia10-kb888656-x86-global-enu

windowsmedia10-kb893240-x86-enu

windowsmedia10-kb893241-x86-enu

windowsmedia10-kb895316-x86-fra

WindowsMedia10-KB911565-x86-FRA

WindowsMedia-KB911564-x86-FRA

Thanks

Link to comment
Share on other sites

  • 1 month later...
Hi,

is there a way to slipstream WMP 10 +the following updates?

windowsmedia10-kb888656-x86-global-enu

windowsmedia10-kb893240-x86-enu

windowsmedia10-kb893241-x86-enu

windowsmedia10-kb895316-x86-fra

WindowsMedia10-KB911565-x86-FRA

WindowsMedia-KB911564-x86-FRA

Thanks

I'm interested too to this. It is possible, for example, to use nLite, before creating the ISO slipstreaming WMP10 with WMP10 Slipstreamer v3, than not create the ISO but restart nLite, slipstreaming ONLY the WindowsMedia hotfixes and than create finally the ISO?

Thanks! B)

Link to comment
Share on other sites

Hi,

is there a way to slipstream WMP 10 +the following updates?

windowsmedia10-kb888656-x86-global-enu

windowsmedia10-kb893240-x86-enu

windowsmedia10-kb893241-x86-enu

windowsmedia10-kb895316-x86-fra

WindowsMedia10-KB911565-x86-FRA

WindowsMedia-KB911564-x86-FRA

Thanks

I install all of the above thru SVCPACK.inf with the execption of KB911565, which I install in RunOnceEx

Here is my svcpack.inf

;Windows XP
[Version]
Signature="$Windows NT$"
MajorVersion=5
MinorVersion=1
BuildNumber=2600

[SetupData]
CatalogSubDir="\i386\SVCPACK"

[ProductCatalogsToInstall]

[SetupHotfixesToRun]
MP10.exe /Q:A /R:x /%systemdrive%"setup_wm.exe /DisallowSystemRestore /Q:A /R:N"
KB873339.exe /q /n /z;Vulnerability in HyperTerminal could allow code execution
KB884020.exe /q /n /z;Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2
KB885222.exe /q /n /z;Performance of 1394 devices may decrease after you install Windows XP Service Pack 2
KB885250.exe /q /n /z;Vulnerability in server message block could allow remote code execution
KB885835.exe /q /n /z;Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilege
KB885836.exe /q /n /z;A vulnerability in WordPad could allow code execution
KB886185.exe /q /n /z;Windows Firewall "My Network (subnet) only" scoping in Windows XP Service Pack 2
KB886677.exe /q /n /z;Double-byte character set (DBCS) characters may appear corrupted in Internet Explorer on Windows XP when you browse a Web site that uses Shift-JIS character encoding
KB887742.exe /q /n /z;You receive the Stop error "Stop 0x05 (INVALID_PROCESS_ATTACH_ATTEMPT)"
KB888113.exe /q /n /z;Vulnerability in hyperlink object library could allow remote code execution
KB888240.exe /q /n /z;Some add-ons are not listed in the Manage Add-ons dialog box in Internet Explorer on your Windows XP Service Pack 2-based computer
KB889527.exe /q /n /z;ICMP packets are dropped even though you have configured the Windows firewall feature to allow ICMP packets on your Windows XP Professional Service
KB888302.exe /q /n /z;Vulnerability in Windows could allow information disclosure
KB890046.exe /q /n /z;Vulnerability in Microsoft agent could allow spoofing
KB890830.exe /q ;Microsoft® Windows® Malicious Software Removal Tool
KB890859.exe /q /n /z;Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service
KB891122.exe /q /n /z;Update for Windows Media Digital Rights Management-enabled players
KB891781.exe /q /n /z;Vulnerability in the DHTML editing component ActiveX control could allow code execution
KB892130.exe /q /n /z;WGA
KB893357.exe /q /n /z;The Wi-Fi Protected Access 2 (WPA2)/Wireless Provisioning Services Information Element (WPS IE) update for Windows XP with Service Pack 2
KB893756.exe /q /n /z;Vulnerability in Telephony service could allow remote code execution
KB893803.exe /q /n /z;Windows Installer 3.1 (v2) is available
KB894391.exe /q /n /z;FIX: DBCS attachment file names are not displayed in Rich Text e-mail messages and you may receive a "Generic Host Process" error message after you install security update MS05-012
KB896358.exe /q /n /z;A vulnerability in HTML Help could allow remote code execution
KB896422.exe /q /n /z;Vulnerability in Server Message Block could allow remote code execution
KB896423.exe /q /n /z;Vulnerability in Print Spooler service could allow remote code execution
KB896424.exe /q /n /z;Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution
KB896428.exe /q /n /z;Vulnerability in Telnet client could allow information disclosure
KB897663.exe /q /n /z;An exception may not show up in the Windows Firewall graphical user interface if you create the exception by modifying the registry
KB898461.exe /q /n /z;Installs a permanent copy of the Package Installer for Windows version 6.1.22.4
KB899587.exe /q /n /z;Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing
KB899589.exe /q /n /z;Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution
KB899591.exe /q /n /z;Vulnerability in Remote Desktop Protocol could allow denial of service
KB900725.exe /q /n /z;Vulnerabilities in Windows Shell Could Allow Remote Code Execution
KB901017.exe /q /n /z;Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows)
KB901214.exe /q /n /z;Vulnerability in Microsoft Colour Management Module could allow remote code execution
KB902400.exe /q /n /z;Vulnerabilities in MS DTC and COM+ Could Allow Remote Code Execution
KB904706.exe /q /n /z;Vulnerability in DirectShow Could Allow Remote Code Execution
KB905414.exe /q /n /z;Vulnerability in Network Connection Manager Could Allow Denial of Service
KB905749.exe /q /n /z;Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege
KB908519.exe /q /n /z;Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution
KB908531.exe /q /n /z;Vulnerability in Windows Explorer Could Lead to Remote Code Execution
KB909520.exe /q /n /z;Microsoft Base Smart Card Cryptographic Service Provider Package
KB909993.exe /q /n /z;Windows Media Connect 2.0
KB910437.exe /q /n /z;Automatic Updates can no longer download updates after an Access Violation error occurs
KB911562.exe /q /n /z;Vulnerability in Microsoft Data Access Components (MDAC) function could allow code execution
KB911564.exe /q /n /z;Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code execution.
KB911927.exe /q /n /z;Vulnerability in Web Client Service could allow remote code execution.
KB912812.exe /q /n /z;Cumulative security update for Internet Explorer
KB912919.exe /q /n /z;Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution
KB913446.exe /q /n /z;Vulnerability in TCP/IP could allow Denial of Service.
MSJava.exe
netfxsp1.exe
WUA20.exe

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...