Other Vulnerabilities
While the preceding sections of this article highlight some major examples of Mac OS X vulnerabilities, they are not an exhaustive list. Security researchers have discovered additional vulnerabilities, both local and remote, that can be used to infiltrate Mac OS X. As with other operating systems, these vulnerabilities can be exploited for the purposes of gaining privileged access to a system and executing code.
Suffice it to say that Mac OS X does have its share of security issues. Some of these issues can be exploited to accomplish any manner of activities under Mac OS X, and some can provide little or no usable access. However, Mac OS X also has some distinct advantages.