As already stated in this thread, the presence of a vulnerability (all systems are vulnerable) does not indicate the presence of an exploit in the wild. As is the case with all software, vulnerabilities exist and are being discovered and patched, most of the time before those vulnerabilities are ever exploited in the real world, as is the case with all the ones you linked.
The real-world fact is an average Mac user running an admin account is no more vulnerable to real (vs hypothetical) threats in the wild than those running a standard user account. You can point to vulnerabilities that could theoretically be exploited and to hypothetical possibilities, but those have no effect on users unless they're actually implemented. If you take your argument further, you can make a case for everyone never using a computer at all, because even with a standard user account, there are vulnerabilities that hypothetically could be exploited.
For responsible, non-paranoid, intelligent computing, using an admin account on OS X is perfectly fine. If someone is paranoid and susceptible to the FUD spread by some, they should certainly use a standard account and probably consider never using a computer at all.
It is quite obvious that you have never had to deal with any kind of security on any unix-based operating system, as such issues and concepts are well and truly beyond your comprehension. As a systems administrator, it is your job to be paranoid, because you can not control what others do on your machine, nor what they could do when they get access to your machine. You simply don't trust anyone with it, which is why you give them the privileges they need, and that's it. If they need anything more, you elevate yourself to your admin account or root account to get them what they need, then you get out of it.
Why do you think that there are all of these exploits out in the wild, and I'm not just talking for OS X? I'm talking Windows, Solaris, Linux, you name it? Because people are not intelligent enough to execute those exploits or open their machine up to be exploited. That's the downfall of the masses who don't know what they are doing, and why there are still machines out there with the Code Red and Nimbda worms on Windows XP. That's why privilege separation was implemented across all Unices, including OS X.
In short, you run the risk of shooting yourself in the foot for running everything under an admin account. It's the equivalent of logging in and doing everything directly as 'root' in Linux or any other Unix OS. You just don't do it. Log in as yourself; your non privileged account, and elevate yourself to the superuser to do the work that requires the superuser, and get out.
You really don't know what you're talking about here, and it clearly shows. I'll take my 20 years professional experience in systems administration over your perceived "real world" any day.
BL.