Apple Pages 5.6.2 Create gorgeous documents in minutes with the all-new Pages for Mac word processor — featuring a stunning new design, new writing tools, and improved performance. Start with an Apple-designed template or create your own design using fonts, styles, and tools from the intelligent Format Panel. New Features Added to Mac OS X Leopard 10.5. This new Mac OS Leopard 10.5 ISO comes with many new features like: Mac OS X Leopard 10.5 ISO & DMG. An improved Automator is introduced. It can create and edit work with the new interface. A new feature ‘watch me do’ is introduced that record user action and reply as an action in a work. Universal GNU Fortran 4.2.3 for Mac OS X 10.4 and higher. It is necessary in order to build R packages from sources that contain Fortran code. Unlike many other builds, this is a fully universal build of GNU Fortran that uses Apple's driver and supports all target architectures (i386, ppc, x8664 and ppc64). Mac Os X 10.5.8 free download - R for Mac OS X, Apple Mac OS X Snow Leopard, Apple Safari, and many more programs. A beginner tutorial for Apple’s Pages 5 for Mac OS X to serve as a quick start guide to using Pages for new users or users just looking to learn some additio.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other security updates, see Apple security updates.
OS X Yosemite v10.10.5 and Security Update 2015-006
- apache - Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in Apache 2.4.16, the most serious of which may allow a remote attacker to cause a denial of service. - Description: Multiple vulnerabilities existed in Apache versions prior to 2.4.16. These were addressed by updating Apache to version 2.4.16. - CVE-ID - CVE-2014-3581 - CVE-2014-3583 - CVE-2014-8109 - CVE-2015-0228 - CVE-2015-0253 - CVE-2015-3183 - CVE-2015-3185 
- apache_mod_php - Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in PHP 5.5.20, the most serious of which may lead to arbitrary code execution. - Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.20. These were addressed by updating Apache to version 5.5.27. - CVE-ID - CVE-2015-2783 - CVE-2015-2787 - CVE-2015-3307 - CVE-2015-3329 - CVE-2015-3330 - CVE-2015-4021 - CVE-2015-4022 - CVE-2015-4024 - CVE-2015-4025 - CVE-2015-4026 - CVE-2015-4147 - CVE-2015-4148 
- Apple ID OD Plug-in - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able change the password of a local user - Description: In some circumstances, a state management issue existed in password authentication. The issue was addressed through improved state management. - CVE-ID - CVE-2015-3799 : an anonymous researcher working with HP's Zero Day Initiative 
- AppleGraphicsControl - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to determine kernel memory layout - Description: An issue existed in AppleGraphicsControl which could have led to the disclosure of kernel memory layout. This issue was addressed through improved bounds checking. - CVE-ID - CVE-2015-5768 : JieTao Yang of KeenTeam 

- Bluetooth - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary code with system privileges - Description: A memory corruption issue existed in IOBluetoothHCIController. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3779 : Teddy Reed of Facebook Security 
- Bluetooth - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to determine kernel memory layout - Description: A memory management issue could have led to the disclosure of kernel memory layout. This issue was addressed with improved memory management. - CVE-ID - CVE-2015-3780 : Roberto Paleari and Aristide Fattori of Emaze Networks 
:max_bytes(150000):strip_icc()/osx-5bc4d52c4cedfd00264179d9.jpg)
- Bluetooth - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious app may be able to access notifications from other iCloud devices - Description: An issue existed where a malicious app could access a Bluetooth-paired Mac or iOS device's Notification Center notifications via the Apple Notification Center Service. The issue affected devices using Handoff and logged into the same iCloud account. This issue was resolved by revoking access to the Apple Notification Center Service. - CVE-ID - CVE-2015-3786 : Xiaolong Bai (Tsinghua University), Luyi Xing (System Security Lab of Indiana University), Tongxin Li (Peking University), XiaoFeng Wang (Indiana University) 
- Bluetooth - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: An attacker with privileged network position may be able to perform denial of service attack using malformed Bluetooth packets - Description: An input validation issue existed in parsing of Bluetooth ACL packets. This issue was addressed through improved input validation. - CVE-ID - CVE-2015-3787 : moony li of Trend Micro 
- Bluetooth - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local attacker may be able to cause unexpected application termination or arbitrary code execution - Description: Multiple buffer overflow issues existed in blued's handling of XPC messages. These issues were addressed through improved bounds checking. - CVE-ID - CVE-2015-3777 : mitp0sh of [PDX] 
- bootp - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: An attacker may be able to determine Wi-Fi networks a device has previously accessed - Description: Upon connecting to a Wi-Fi network, MAC addresses of previously accessed networks may have been broadcast. This issue was addressed by broadcasting only MAC addresses associated with the current SSID. - CVE-ID - CVE-2015-3778 : Piers O'Hanlon of Oxford Internet Institute, University of Oxford (on the EPSRC Being There project) 
Os X 10.10.5 Update
- CloudKit - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to access the iCloud user record of a previously signed in user - Description: A state inconsistency existed in CloudKit when signing out users. This issue was addressed through improved state handling. - CVE-ID - CVE-2015-3782 : Deepkanwal Plaha of University of Toronto 
- CoreMedia Playback - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution - Description: Memory corruption issues existed in CoreMedia Playback. These were addressed through improved memory handling. - CVE-ID - CVE-2015-5777 : Apple - CVE-2015-5778 : Apple 
- CoreText - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. - CVE-ID - CVE-2015-5761 : John Villamil (@day6reak), Yahoo Pentest Team 
- CoreText - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. - CVE-ID - CVE-2015-5755 : John Villamil (@day6reak), Yahoo Pentest Team 
- curl - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities in cURL and libcurl prior to 7.38.0, one of which may allow remote attackers to bypass the Same Origin Policy. - Description: Multiple vulnerabilities existed in cURL and libcurl prior to 7.38.0. These issues were addressed by updating cURL to version 7.43.0. - CVE-ID - CVE-2014-3613 - CVE-2014-3620 - CVE-2014-3707 - CVE-2014-8150 - CVE-2014-8151 - CVE-2015-3143 - CVE-2015-3144 - CVE-2015-3145 - CVE-2015-3148 - CVE-2015-3153 
- Data Detectors Engine - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a sequence of unicode characters can lead to an unexpected application termination or arbitrary code execution - Description: Memory corruption issues existed in processing of Unicode characters. These issues were addressed through improved memory handling. - CVE-ID - CVE-2015-5750 : M1x7e1 of Safeye Team (www.safeye.org) 
- Date & Time pref pane - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Applications that rely on system time may have unexpected behavior - Description: An authorization issue existed when modifying the system date and time preferences. This issue was addressed with additional authorization checks. - CVE-ID - CVE-2015-3757 : Mark S C Smith 
- Dictionary Application - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: An attacker with a privileged network position may be able to intercept users' Dictionary app queries - Description: An issue existed in the Dictionary app, which did not properly secure user communications. This issue was addressed by moving Dictionary queries to HTTPS. - CVE-ID - CVE-2015-3774 : Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team 
- DiskImages - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges - Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3800 : Frank Graziano of the Yahoo Pentest Team 
- dyld - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary code with system privileges - Description: A path validation issue existed in dyld. This was addressed through improved environment sanitization. - CVE-ID - CVE-2015-3760 : beist of grayhash, Stefan Esser 
- FontParser - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. - CVE-ID - CVE-2015-3804 : Apple - CVE-2015-5775 : Apple 
- FontParser - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. - CVE-ID - CVE-2015-5756 : John Villamil (@day6reak), Yahoo Pentest Team 
- groff - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple issues in pdfroff - Description: Multiple issues existed in pdfroff, the most serious of which may allow arbitrary filesystem modification. These issues were addressed by removing pdfroff. - CVE-ID - CVE-2009-5044 - CVE-2009-5078 
- ImageIO - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in the processing of TIFF images. This issue was addressed through improved bounds checking. - CVE-ID - CVE-2015-5758 : Apple 
- ImageIO - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Visiting a maliciously crafted website may result in the disclosure of process memory - Description: An uninitialized memory access issue existed in ImageIO's handling of PNG and TIFF images. Visiting a malicious website may result in sending data from process memory to the website. This issue is addressed through improved memory initialization and additional validation of PNG and TIFF images. - CVE-ID - CVE-2015-5781 : Michal Zalewski - CVE-2015-5782 : Michal Zalewski 
- Install Framework Legacy - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute arbitrary code with root privileges - Description: An issue existed in how Install.framework's 'runner' binary dropped privileges. This issue was addressed through improved privilege management. - CVE-ID - CVE-2015-5784 : Ian Beer of Google Project Zero 
- Install Framework Legacy - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute arbitrary code with system privileges - Description: A race condition existed in Install.framework's 'runner' binary that resulted in privileges being incorrectly dropped. This issue was addressed through improved object locking. - CVE-ID - CVE-2015-5754 : Ian Beer of Google Project Zero 
- IOFireWireFamily - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary code with system privileges - Description: Memory corruption issues existed in IOFireWireFamily. These issues were addressed through additional type input validation. - CVE-ID - CVE-2015-3769 : Ilja van Sprundel - CVE-2015-3771 : Ilja van Sprundel - CVE-2015-3772 : Ilja van Sprundel 
- IOGraphics - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute arbitrary code with system privileges - Description: A memory corruption issue existed in IOGraphics. This issue was addressed through additional type input validation. - CVE-ID - CVE-2015-3770 : Ilja van Sprundel - CVE-2015-5783 : Ilja van Sprundel 
- IOHIDFamily - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary code with system privileges - Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-5774 : TaiG Jailbreak Team 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to determine kernel memory layout - Description: An issue existed in the mach_port_space_info interface, which could have led to the disclosure of kernel memory layout. This was addressed by disabling the mach_port_space_info interface. - CVE-ID - CVE-2015-3766 : Cererdlong of Alibaba Mobile Security Team, @PanguTeam 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute arbitrary code with system privileges - Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments. - CVE-ID - CVE-2015-3768 : Ilja van Sprundel 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to cause a system denial of service - Description: A resource exhaustion issue existed in the fasttrap driver. This was addressed through improved memory handling. - CVE-ID - CVE-2015-5747 : The Brainy Code Scanner (m00nbsd) 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to cause a system denial of service - Description: A validation issue existed in the mounting of HFS volumes. This was addressed by adding additional checks. - CVE-ID - CVE-2015-5748 : Maxime Villard of m00nbsd 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute unsigned code - Description: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed through improved code signature validation. - CVE-ID - CVE-2015-3806 : TaiG Jailbreak Team 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A specially crafted executable file could allow unsigned, malicious code to execute - Description: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved validation of executable files. - CVE-ID - CVE-2015-3803 : TaiG Jailbreak Team 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute unsigned code - Description: A validation issue existed in the handling of Mach-O files. This was addressed by adding additional checks. - CVE-ID - CVE-2015-3802 : TaiG Jailbreak Team - CVE-2015-3805 : TaiG Jailbreak Team 
- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted plist may lead to an unexpected application termination or arbitrary code execution with system privileges - Description: A memory corruption existed in processing of malformed plists. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3776 : Teddy Reed of Facebook Security, Patrick Stein (@jollyjinx) of Jinx Germany 

- Kernel - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary code with system privileges - Description: A path validation issue existed. This was addressed through improved environment sanitization. - CVE-ID - CVE-2015-3761 : beist of grayish 
- Libc - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted regular expression may lead to an unexpected application termination or arbitrary code execution - Description: Memory corruption issues existed in the TRE library. These were addressed through improved memory handling. - CVE-ID - CVE-2015-3796 : Ian Beer of Google Project Zero - CVE-2015-3797 : Ian Beer of Google Project Zero - CVE-2015-3798 : Ian Beer of Google Project Zero 
- Libinfo - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution - Description: Memory corruption issues existed in handling AF_INET6 sockets. These were addressed by improved memory handling. - CVE-ID - CVE-2015-5776 : Apple 
- libpthread - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute arbitrary code with system privileges - Description: A memory corruption issue existed in handling syscalls. This issue was addressed through improved lock state checking. - CVE-ID - CVE-2015-5757 : Lufeng Li of Qihoo 360 
- libxml2 - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2, the most serious of which may allow a remote attacker to cause a denial of service - Description: Multiple vulnerabilities existed in libxml2 versions prior to 2.9.2. These were addressed by updating libxml2 to version 2.9.2. - CVE-ID - CVE-2014-0191 : Felix Groebert of Google 
Mac Os X 10.10.5 Update
- libxml2 - Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information - Description: A memory access issue existed in libxml2. This was addressed by improved memory handling - CVE-ID - CVE-2014-3660 : Felix Groebert of Google 
- libxml2 - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information - Description: A memory corruption issue existed in parsing of XML files. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3807 : Apple 
- libxpc - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to execute arbitrary code with system privileges - Description: A memory corruption issue existed in handling of malformed XPC messages. This issue was improved through improved bounds checking. - CVE-ID - CVE-2015-3795 : Mathew Rowley 
- mail_cmds - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary shell commands - Description: A validation issue existed in the mailx parsing of email addresses. This was addressed by improved sanitization. - CVE-ID - CVE-2014-7844 
- Notification Center OSX - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A malicious application may be able to access all notifications previously displayed to users - Description: An issue existed in Notification Center, which did not properly delete user notifications. This issue was addressed by correctly deleting notifications dismissed by users. - CVE-ID - CVE-2015-3764 : Jonathan Zdziarski 
- ntfs - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A local user may be able to execute arbitrary code with system privileges - Description: A memory corruption issue existed in NTFS. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-5763 : Roberto Paleari and Aristide Fattori of Emaze Networks 
- OpenSSH - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Remote attackers may be able to circumvent a time delay for failed login attempts and conduct brute-force attacks - Description: An issue existed when processing keyboard-interactive devices. This issue was addressed through improved authentication request validation. - CVE-ID - CVE-2015-5600 
- OpenSSL - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg, the most serious of which may allow a remote attacker to cause a denial of service. - Description: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg. These were addressed by updating OpenSSL to version 0.9.8zg. - CVE-ID - CVE-2015-1788 - CVE-2015-1789 - CVE-2015-1790 - CVE-2015-1791 - CVE-2015-1792 
- perl - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted regular expression may lead to disclosure of unexpected application termination or arbitrary code execution - Description: An integer underflow issue existed in the way Perl parsed regular expressions. This issue was addressed through improved memory handling. - CVE-ID - CVE-2013-7422 
- PostgreSQL - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: An attacker may be able to cause unexpected application termination or gain access to data without proper authentication - Description: Multiple issues existed in PostgreSQL 9.2.4. These issues were addressed by updating PostgreSQL to 9.2.13. - CVE-ID - CVE-2014-0067 - CVE-2014-8161 - CVE-2015-0241 - CVE-2015-0242 - CVE-2015-0243 - CVE-2015-0244 
- python - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in Python 2.7.6, the most serious of which may lead to arbitrary code execution - Description: Multiple vulnerabilities existed in Python versions prior to 2.7.6. These were addressed by updating Python to version 2.7.10. - CVE-ID - CVE-2013-7040 - CVE-2013-7338 - CVE-2014-1912 - CVE-2014-7185 - CVE-2014-9365 
- QL Office - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted Office document may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in parsing of Office documents. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-5773 : Apple 
- QL Office - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted XML file may lead to disclosure of user information - Description: An external entity reference issue existed in XML file parsing. This issue was addressed through improved parsing. - CVE-ID - CVE-2015-3784 : Bruno Morisson of INTEGRITY S.A. 
- Quartz Composer Framework - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted QuickTime file may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in parsing of QuickTime files. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-5771 : Apple 
- Quick Look - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Searching for a previously viewed website may launch the web browser and render that website - Description: An issue existed where QuickLook had the capability to execute JavaScript. The issue was addressed by disallowing execution of JavaScript. - CVE-ID - CVE-2015-3781 : Andrew Pouliot of Facebook, Anto Loyola of Qubole 
- QuickTime 7 - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution - Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. - CVE-ID - CVE-2015-3779 - CVE-2015-5753 : Apple - CVE-2015-5779 : Apple 
- QuickTime 7 - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted file may lead to an unexpected application termination or arbitrary code execution - Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. - CVE-ID - CVE-2015-3765 : Joe Burnett of Audio Poison - CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos - CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos - CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos - CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos - CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos - CVE-2015-5751 : WalkerFuz 
- SceneKit - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Viewing a maliciously crafted Collada file may lead to arbitrary code execution - Description: A heap buffer overflow existed in SceneKit's handling of Collada files. This issue was addressed through improved input validation. - CVE-ID - CVE-2015-5772 : Apple 
- SceneKit - Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.4 - Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in SceneKit. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3783 : Haris Andrianakis of Google Security Team 
- Security - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A standard user may be able to gain access to admin privileges without proper authentication - Description: An issue existed in handling of user authentication. This issue was addressed through improved authentication checks. - CVE-ID - CVE-2015-3775 : [Eldon Ahrold] 
- SMBClient - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in the SMB client. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3773 : Ilja van Sprundel 
- Speech UI - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted unicode string with speech alerts enabled may lead to an unexpected application termination or arbitrary code execution - Description: A memory corruption issue existed in handling of Unicode strings. This issue was addressed by improved memory handling. - CVE-ID - CVE-2015-3794 : Adam Greenbaum of Refinitive 
- sudo - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in sudo versions prior to 1.7.10p9, the most serious of which may allow an attacker access to arbitrary files - Description: Multiple vulnerabilities existed in sudo versions prior to 1.7.10p9. These were addressed by updating sudo to version 1.7.10p9. - CVE-ID - CVE-2013-1775 - CVE-2013-1776 - CVE-2013-2776 - CVE-2013-2777 - CVE-2014-0106 - CVE-2014-9680 
- tcpdump - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Multiple vulnerabilities existed in tcpdump 4.7.3, the most serious of which may allow a remote attacker to cause a denial of service. - Description: Multiple vulnerabilities existed in tcpdump versions prior to 4.7.3. These were addressed by updating tcpdump to version 4.7.3. - CVE-ID - CVE-2014-8767 - CVE-2014-8769 - CVE-2014-9140 
- Text Formats - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Parsing a maliciously crafted text file may lead to disclosure of user information - Description: An XML external entity reference issue existed with TextEdit parsing. This issue was addressed through improved parsing. - CVE-ID - CVE-2015-3762 : Xiaoyong Wu of the Evernote Security Team 
- udf - Available for: OS X Yosemite v10.10 to v10.10.4 - Impact: Processing a maliciously crafted DMG file may lead to an unexpected application termination or arbitrary code execution with system privileges - Description: A memory corruption issue existed in parsing of malformed DMG images. This issue was addressed through improved memory handling. - CVE-ID - CVE-2015-3767 : beist of grayhash 

OS X Yosemite v10.10.5 includes the security content of Safari 8.0.8.
Pages is a powerful word processor that lets you create stunning documents, and comes included with most Apple devices. And with real-time collaboration, your team can work together from anywhere, whether they’re on Mac, iPad, iPhone, or using a PC.
From the start, Pages places you in the perfect creative environment. It puts all the right tools in all the right places, so it’s easy to choose a look, customize fonts, personalize text styles, and add beautiful graphics. And everyone collaborating on a document has access to the same powerful features.
Start with something beautiful.
Choose from over 70 beautiful Apple‑designed templates, and customize your reports, letters, and other documents any way you like. And, if you’ve ever dreamed of writing a book or fairy tale, it’s easy to create interactive stories right inside Pages.
Make progress you can see.
Track changes, add highlights, and have threaded conversations with your team. Your edits are saved automatically.
Stunning results. Effortlessly.
Liven up your text by filling it with color gradients or images. And, take the entire page to the next level by adding photos, galleries, audio clips, video, math equations, charts, or more than 700 customizable shapes.
What’s new in Pages.
NewTurn handwriting into text. Magically.
With Scribble and Apple Pencil, your handwritten words will automatically be converted to typed text. Take notes, write a book, or annotate a paper fast and easy.
NewWrite reports easier.
With new report templates, there’s no staring at a blank page. Jump start an essay, research paper, or school report by choosing from one of the 3 new templates.
Skim through in style.

Now, on your iPhone and iPad, you can read through your document, zoom in and out, and interact with it — without accidentally changing anything.
Pages For Mac Os X 10 10 50
Play videos right in your documents.
Play YouTube and Vimeo videos right in Pages, without the need to open a web browser. Simply add a link, and play your web video inside your document or book.
You don’t work in one place on just one device. The same goes for Pages. Work seamlessly across all your Apple devices. The documents you create using a Mac or iPad will look the same on an iPhone or web browser — and vice versa.
You can also work on documents stored on iCloud or Box using a PC.
Work together in the same document, from across town or across the world. You can see your team’s edits as they make them — and they can watch as you make yours, too. Just click the Collaborate button and invite people to join.
Use Apple Pencil on your iPad to sketch, illustrate, and create documents. Draw and fine-tune your idea, then press play to watch each stroke animate onto the page. Plus, with Smart Annotation, your edits stay with the marked-up text, making it easy for you and your team to incorporate changes.
Teaming up with someone who uses Microsoft Word? Pages makes it simple. You can save Pages documents as Word files. Or import and edit Word documents right in Pages.
Pages For Mac 10.10.5
Numbers
Create great-looking
spreadsheets. Together.
Keynote
Pages For Mac Version 10.10.5
Build stunning, memorable
presentations. Easily.