An exploit needs to be able to run on the target system. In order to do so it needs to be specifically written for the application and specific platform being targeted. Otherwise you're asking us to believe malware writers are able to do something the rest of the software development community is unable to do: Write a single binary that runs, unaltered and without emulation, on all platforms and operating systems.That last bit right there is the key. Most exploits that we're worried about when considering this PPC thread's subject are surrounding Safari, or whatever browser they choose to use. Since they can't update those applications (stock mac apps anyway) then thats where you're vulnerable. Have I made the point clear yet?
Edit: The 'exploit' being specifically written to target Safari is something you can assume. Vulnerabilities are rarely tied to hardware, but they do happen as evidenced by Intel's laundry list of security advisories. Part of my day job is going through vulnerabilities that come out every day and writing audits for them. I'd estimate that 95-98% of the vulnerabilities that I end up going through are software specific related.
The instruction set for a specific processor is, typically, unique to that specific implementation. How a register is loaded is a different opcode on Intel than it is PPC than it is 68K. Thus the instruction code for Intel processor is not going to run, unaltered, on a PPC processor. Exploits, unless targeted at weakness in a cross platform technology, are very platform specific and as such are extremely unlikely to run on anything but the targeted platform. No and or ifs about it.