:roll: @ article
The Microsoft Windows application
It's not an
application, it's an
operating system.
Before I start, I'm not a Mac OS X fan, I've barely used it, but for god's sake some people really ought to get their facts straight (comment not aimed at original poster).
In their statistics they change wording when they get to Mac OS X. Previously they say "remotely exploitable", then they say "exploitable over the Internet". "Remotely exploitable" is an official term in security vulnerability circles, and "exploitable over the Internet" is not. While they both have potentially compatible meanings, it is poor journalism (and if Secunia did the same, poor of them as well) to potentially change the goalposts in such a way.
Admittedly the focus of my work is Windows security so I'm going to take more notice of Windows vulnerabilities than for other operating systems, but a remotely exploitable vuln like the DCOM vulnerabilities would definitely have got my attention, and quite frankly I have not heard of one for Mac OS X. In recent history (last few months) I have heard of one Mac OS X vuln which required user interaction on not one but two occasions to successfully exploit it.
Windows vulnerabilities tend to be in the shape of "if you use this product, you're screwed". IE vulns for example 99% of the time are "if you look at this web page, you're screwed, but if you switch off 'Active Scripting'...". In my limited experience with other operating systems, this is not usually the case. Usually the vulnerabilities are more obscure.
Windows vulnerabilities also usually stem from "this stupid component should not even be running in the first place on a default install but MS have it running, in their infinite wisdom", such as Windows networking filesharing services, DCOM, all left running. B'duh.