Check compatibility
- Jul 01, 2020 Server Version#: Version 1.19.4.2935 I need some technical advice from an Apple MacMini guru who also uses it for a Plex Server. Background: I’m a lifetime Plex Pass member and currently running Plex on our 10 year old family Mac mini (Mid 2011, Intel Core i7, 2 GHz, 8Gb Memory) with El Capitan OS X 10.11.6. I can’t upgrade El Capitan higher than that version. Besides a USB attached 4TB.
- Download: OS X El Capitan 10.11.6 Final Version Released. After a period of testing that has seen five pre-release seeds issued to registered developers and those enrolled on Apple’s public Beta Software program, OS X El Capitan 10.11.6 has now been released in a final public capacity. This year’s Worldwide Developers Conference ( WWDC 2016) keynote may have revealed the future of OS X, or macOS as it.
- For the last two years, Apple has released a single operating system update between WWDC and the launch of the next upgrade. In 2016, that update, OS X 10.11.6, appeared on July 18; the following.
You can upgrade to OS X El Capitan from OS X Snow Leopard or later on any of the following Mac models. Your Mac also needs at least 2GB of memory and 8.8GB of available storage space.
Mac users interested in Keynote for os x 10.6.8 generally download: Keynote 10.0 Delivers high-end presentations with the possibility to customize the output and even connect other devices like the iPad and the Apple Pencil to draw directly on the slides.
MacBook introduced in 2009 or later, plus MacBook (13-inch, Aluminum, Late 2008)
MacBook Air introduced in late 2008 or later
MacBook Pro introduced in mid 2007 or later
Mac mini introduced in early 2009 or later
iMac introduced in mid 2007 or later
Mac Pro introduced in early 2008 or later
Xserve models introduced in early 2009
MacBook Air introduced in late 2008 or later
MacBook Pro introduced in mid 2007 or later
Mac mini introduced in early 2009 or later
iMac introduced in mid 2007 or later
Mac Pro introduced in early 2008 or later
Xserve models introduced in early 2009
To find your Mac model, memory, storage space, and macOS version, choose About This Mac from the Apple menu . If your Mac isn't compatible with OS X El Capitan, the installer will let you know.
Make a backup
Before installing any upgrade, it’s a good idea to back up your Mac. Time Machine makes it simple, and other backup methods are also available. Learn how to back up your Mac.
Get connected
It takes time to download and install OS X, so make sure that you have a reliable Internet connection. If you're using a Mac notebook computer, plug it into AC power.
Download OS X El Capitan
For the strongest security and latest features, find out whether you can upgrade to macOS Catalina, the latest version of macOS.
If you still need OS X El Capitan, use this link: Download OS X El Capitan. A file named InstallMacOSX.dmg will download to your Mac.
Install the macOS installer
Double-click the downloaded file to open a window showing its contents. Then double-click the file within, named InstallMacOSX.pkg.
Follow the onscreen instructions, which will guide you through the steps necessary to install.
Begin installation
After installation of the installer is complete, open the Applications folder on your Mac, then double-click the file named Install OS X El Capitan. Ricoh printer driver for mac os x.
Click Continue and follow the onscreen instructions. You might find it easiest to begin installation in the evening so that it can complete overnight, if needed.
Allow installation to complete
Please allow installation to complete without putting your Mac to sleep or closing its lid. Your Mac might restart, show a progress bar, or show a blank screen several times as it installs both OS X and related updates to your Mac firmware.
Learn more
- OS X El Capitan won't install on top of a later version of macOS, but you can erase your disk first or install on another disk.
- You can use macOS Recovery to reinstall macOS.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other security updates, see Apple security updates.
OS X El Capitan 10.11.1, Security Update 2015-004 Yosemite, and Security Update 2015-007 Mavericks
- Accelerate Frameworkhttps://potentsilk137.weebly.com/malware-for-mac-os-x-107-5.html. Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: A memory corruption issue existed in the Accelerate Framework in multi-threading mode. This issue was addressed through improved accessor element validation and improved object locking.CVE-IDCVE-2015-5940 : Apple
Keynote For Os X 10.11
- apache_mod_phpAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Multiple vulnerabilities in PHPDescription: Multiple vulnerabilities existed in PHP versions prior to 5.5.29 and 5.4.45. These were addressed by updating PHP to versions 5.5.29 and 5.4.45.CVE-2015-0235CVE-2015-0273CVE-2015-6834CVE-2015-6835CVE-2015-6836CVE-2015-6837CVE-2015-6838
- ATSAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Visiting a maliciously crafted webpage may lead to an unexpected application termination or arbitrary code executionDescription: A memory corruption issue existed in ATS. This issue was addressed through improved memory handling.CVE-IDCVE-2015-6985 : John Villamil (@day6reak), Yahoo Pentest Team
- AudioAvailable for: OS X El Capitan 10.11Impact: A malicious application may be able to execute arbitrary codeDescription: An uninitialized memory issue existed in coreaudiod. This issue was addressed through improved memory initialization.CVE-IDCVE-2015-7003 : Mark Brand of Google Project Zero
- AudioAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Playing a malicious audio file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of audio files. These issues were addressed through improved memory handling.CVE-IDCVE-2015-5933 : AppleCVE-2015-5934 : Apple
- BomAvailable for: OS X El Capitan 10.11Impact: Unpacking a maliciously crafted archive may lead to arbitrary code executionDescription: A file traversal vulnerability existed in the handling of CPIO archives. This issue was addressed through improved validation of metadata.CVE-IDCVE-2015-7006 : Mark Dowd of Azimuth Security
- CFNetworkAvailable for: OS X El Capitan 10.11Impact: Visiting a maliciously crafted website may lead to cookies being overwrittenDescription: A parsing issue existed when handling cookies with different letter casing. This issue was addressed through improved parsing.CVE-IDCVE-2015-7023 : Marvin Scholz and Michael Lutonsky; Xiaofeng Zheng and Jinjin Liang of Tsinghua University, Jian Jiang of University of California, Berkeley, Haixin Duan of Tsinghua University and International Computer Science Institute, Shuo Chen of Microsoft Research Redmond, Tao Wan of Huawei Canada, Nicholas Weaver of International Computer Science Institute and University of California, Berkeley, coordinated via CERT/CC
- configdAvailable for: OS X El Capitan 10.11Impact: A malicious application may be able to elevate privileges Free download for mac games.Description: A heap based buffer overflow issue existed in the DNS client library. A malicious application with the ability to spoof responses from the local configd service may have been able to cause arbitrary code execution in DNS clients.CVE-IDCVE-2015-7015 : PanguTeam
- CoreGraphicsAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in CoreGraphics. These issues were addressed through improved memory handling.CVE-IDCVE-2015-5925 : AppleCVE-2015-5926 : Apple
- CoreTextAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-6992 : John Villamil (@day6reak), Yahoo Pentest Team
- CoreTextAvailable for: OS X Yosemite v10.10.5 and OS X El Capitan 10.11Impact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-6975 : John Villamil (@day6reak), Yahoo Pentest Team
- CoreTextAvailable for: OS X El Capitan 10.11Impact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-7017 : John Villamil (@day6reak), Yahoo Pentest Team
- CoreTextAvailable for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5Impact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.CVE-2015-5944 : John Villamil (@day6reak), Yahoo Pentest Team
- Directory UtilityDownload all photos icloud mac. Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: A local user may be able to execute arbitrary code with root privilegesDescription: An authentication issue existed during the establishment of new sessions. This issue was addressed through improved authorization checks.CVE-IDCVE-2015-6980 : Michael of Westside Community Schools
- Disk ImagesAvailable for: OS X El Capitan 10.11Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling.CVE-IDCVE-2015-6995 : Ian Beer of Google Project Zero
Apple Keynote For El Capitan
- EFIAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: An attacker can exercise unused EFI functionsDescription: An issue existed with EFI argument handling. This was addressed by removing the affected functions.CVE-IDCVE-2014-4860 : Corey Kallenberg, Xeno Kovah, John Butterworth, and Sam Cornwell of The MITRE Corporation, coordinated via CERTEntry updated June 30, 2017
- File BookmarkAvailable for: OS X El Capitan 10.11Impact: Browsing to a folder with malformed bookmarks may cause unexpected application terminationDescription: An input validation issue existed in parsing bookmark metadata. This issue was addressed through improved validation checks.CVE-IDCVE-2015-6987 : Luca Todesco (@qwertyoruiop) 2013 honda accord owners manual download.
- FontParserAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-5927 : AppleCVE-2015-5942CVE-2015-6976 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-6977 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-6978 : Jaanus Kp, Clarified Security, working with HP's Zero Day InitiativeCVE-2015-6991 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-6993 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-7009 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-7010 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-7018 : John Villamil (@day6reak), Yahoo Pentest Team
- FontParserAvailable for: OS X El Capitan 10.11Impact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the handling of font files. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-6990 : John Villamil (@day6reak), Yahoo Pentest TeamCVE-2015-7008 : John Villamil (@day6reak), Yahoo Pentest Team
Apple Keynote For Os X 10.11.6 El Capitan
- Grand Central DispatchAvailable for: OS X Yosemite v10.10.5 and OS X El Capitan 10.11Impact: Processing a maliciously crafted package may lead to arbitrary code executionDescription: A memory corruption issue existed in the handling of dispatch calls. This issue was addressed through improved memory handling.CVE-IDCVE-2015-6989 : Apple
- Graphics DriversAvailable for: OS X El Capitan 10.11Impact: A local user may be able to cause unexpected system termination or read kernel memoryDescription: Multiple out of bounds read issues existed in the NVIDIA graphics driver. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-7019 : Ian Beer of Google Project ZeroCVE-2015-7020 : Moony Li of Trend Micro
- Graphics DriversAvailable for: OS X El Capitan 10.11Impact: A local user may be able to execute arbitrary code with kernel privilegesDescription: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.CVE-IDCVE-2015-7021 : Moony Li of Trend Micro
- ImageIOAvailable for: OS X Mavericks v10.9.5 and OS X Yosemite v10.10.5Impact: Processing a maliciously crafted image file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the parsing of image metadata. These issues were addressed through improved metadata validation.CVE-IDCVE-2015-5935 : AppleCVE-2015-5938 : Apple
- ImageIOAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Processing a maliciously crafted image file may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the parsing of image metadata. These issues were addressed through improved metadata validation.CVE-IDCVE-2015-5936 : AppleCVE-2015-5937 : AppleCVE-2015-5939 : Apple
- IOAcceleratorFamilyAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A memory corruption issue existed in IOAcceleratorFamily. This issue was addressed through improved memory handling.CVE-IDCVE-2015-6996 : Ian Beer of Google Project Zero
- IOHIDFamilyAvailable for: OS X El Capitan 10.11Impact: A malicious application may be able to execute arbitrary code with kernel privilegesDescription: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.CVE-IDCVE-2015-6974 : Luca Todesco (@qwertyoruiop)
- KernelAvailable for: OS X Yosemite v10.10.5Impact: A local user may be able to execute arbitrary code with system privilegesDescription: A type confusion issue existed in the validation of Mach tasks. This issue was addressed through improved Mach task validation.CVE-IDCVE-2015-5932 : Luca Todesco (@qwertyoruiop), Filippo Bigarella
- KernelAvailable for: OS X El Capitan 10.11Impact: An attacker with a privileged network position may be able to execute arbitrary codeDescription: An uninitialized memory issue existed in the kernel. This issue was addressed through improved memory initialization.CVE-IDCVE-2015-6988 : The Brainy Code Scanner (m00nbsd)
- KernelAvailable for: OS X El Capitan 10.11Impact: A local application may be able to cause a denial of serviceDescription: An issue existed when reusing virtual memory. This issue was addressed through improved validation.CVE-IDCVE-2015-6994 : Mark Mentovai of Google Inc.
- libarchiveAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: A malicious application may be able to overwrite arbitrary filesDescription: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.CVE-IDCVE-2015-6984 : Christopher Crone of Infinit, Jonathan Schleifer
- MCX Application RestrictionsAvailable for: OS X Yosemite v10.10.5 and OS X El Capitan 10.11Impact: A developer-signed executable may acquire restricted entitlementsDescription: An entitlement validation issue existed in Managed Configuration. A developer-signed app could bypass restrictions on use of restricted entitlements and elevate privileges. This issue was addressed through improved provisioning profile validation.CVE-IDCVE-2015-7016 : Apple
- mDNSResponderAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code executionDescription: Multiple memory corruption issues existed in DNS data parsing. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-7987 : Alexandre Helie
- mDNSResponderAvailable for: OS X El Capitan v10.11Impact: A local application may be able to cause a denial of serviceDescription: A null pointer dereference issue was addressed through improved memory handling.CVE-IDCVE-2015-7988 : Alexandre Helie
- Net-SNMPAvailable for: OS X El Capitan 10.11Impact: An attacker in a privileged network position may be able to cause a denial of serviceDescription: Multiple issues existed in netsnmp version 5.6. These issues were addressed by using patches affecting OS X from upstream.CVE-IDCVE-2012-6151CVE-2014-3565
Os X El Capitan
- OpenGLAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: A memory corruption issue existed in OpenGL. This issue was addressed through improved memory handling.CVE-IDCVE-2015-5924 : Apple
- OpenSSHAvailable for: OS X El Capitan 10.11Impact: A local user may be able to conduct impersonation attacksDescription: A privilege separation issue existed in PAM support. This issue was addressed with improved authorization checks.CVE-IDCVE-2015-6563 : Moritz Jodeit of Blue Frost Security GmbH
- SandboxAvailable for: OS X El Capitan 10.11Impact: A local user may be able to execute arbitrary code with kernel privilegesDescription: An input validation issue existed when handling NVRAM parameters. This issue was addressed through improved validation.CVE-IDCVE-2015-5945 : Rich Trouton (@rtrouton), Howard Hughes Medical Institute, Apple
- Script EditorAvailable for: OS X El Capitan 10.11Impact: An attacker may trick a user into running arbitrary AppleScriptDescription: In some circumstances, Script Editor did not ask for user confirmation before executing AppleScripts. This issue was addressed by prompting for user confirmation before executing AppleScripts.CVE-IDCVE-2015-7007 : Joe Vennix
- SecurityAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11Impact: An Apple-signed binary could be used to load arbitrary filesDescription: Certain Apple-signed executables loaded applications from relative locations. This was addressed through additional checks in Gatekeeper.CVE-IDCVE-2015-7024 : Patrick Wardle of Synack
- SecurityAvailable for: OS X El Capitan 10.11Impact: Processing a maliciously crafted certificate may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the ASN.1 decoder. These issues were addressed through improved input validation.CVE-IDCVE-2015-7059 : David Keeler of MozillaCVE-2015-7060 : Tyson Smith of MozillaCVE-2015-7061 : Ryan Sleevi of Google
- SecurityAvailable for: OS X El Capitan 10.11Impact: A malicious application may be able to overwrite arbitrary filesDescription: A double free issue existed in the handling of AtomicBufferedFile descriptors. This issue was addressed through improved validation of AtomicBufferedFile descriptors.CVE-IDCVE-2015-6983 : David Benjamin, Greg Kerr, Mark Mentovai and Sergey Ulanov from the Chrome Team
- SecurityAgentAvailable for: OS X El Capitan 10.11Impact: A malicious application can programmatically control keychain access promptsDescription: A method existed for applications to create synthetic clicks on keychain prompts. This was addressed by disabling synthetic clicks for keychain access windows.CVE-IDCVE-2015-5943
OS X El Capitan v10.11.1 includes the security content of Safari 9.0.1.
Apple Keynote For Os X 10.11.6 Installer
Security Update 2015-004 and 2015-007 is recommended for all users and improves the security of OS X.