Name one. The two you named are dismissed because they have never spread in the wild, only under lab conditions with engineers trying to get it to spread.
Reason it's not in the wild is as crusher detailed...there aren't enough machines to spread it properly.
You also seem to like percentages. How about hard numbers. There are over 25 million OS X boxes out there not getting infected. The sadmind worm spread widely through Solaris 7, and I think we all agree there weren't even close to 25 million unpatched Solaris 7 boxes out there (Sun had issued a fix two years before). The IIS component of sadmind is irrelevant, since it only modified web content, not using IIS as a vector.
There have been propagating virus/worms for devices with a far smaller installed base, and you don't think OS X with 25 million installs has a critical mass? Rubbish.
We already discussed the first exploit available on the mac over 1 year ago. In fact N3WBI3 left FR for 1 month because he lost the bet we had (loser had to leave for 1 month).
The setup was take an upatched OSX box (which some users have) and execute an exploit that will run unwanted code on the machine. I won and he left for 1 month.
If you're really interested in Mac security you'd already know about the exploit. Instead you're more interested in misdirection, arguing, and attacking windows.
The more you drag it on the more foolish you make yourself look. Heck just look at exploit #1 for MOAB...you don't even need to go back to the original OSX install.
BTW: you should change your screen name to Capt Titanic.
Your argument sounds a lot like his. We can't sink, let's go through the iceberg.
He's a Microsoft troll and the facts will NEVER satisfy him.
See you on another Mac thread.