Chrome survived day one. Luckily, Safari will soon be based on Webkit2 (
http://trac.webkit.org/wiki/WebKit2) with a similar sandbox to Chrome.
Right now Safari only sandboxes plugins. The rendering (webkit - safari exploited today via webkit) and scripting engines are not sandboxed in the current Safari.
Chrome sandboxes all these components and so will Safari once based on Webkit2.
IE's sandbox (protected mode) was bypassed today during pwn2own. IE sandboxes the UI frame from tab process but does not sandbox plugins, rendering engine, and scripting engine from tab process so each process runs as a complete browser process.
All OS have vulnerabilities in client software that parse a lot of data types, such as web browsers, office suites, & etc.
But, OS X has a very low incidence rate of privilege escalation to the system level which is required to install malicious software in security sensitive areas of an OS. No examples of privilege escalation in OS X being used in malware in the wild unlike Windows 7 (see Stuxnet).
In relation to privilege escalation in Windows 7, there is an unpatched
win32k.sys vulnerability related to the priv esc used in Stuxnet that has been public for 216 days. Also, there is a public
remote root vulnerability (with proof of concept exploit) that affects Windows 7 that is public and unpatched for over three weeks.
So much for the Safari hacked first headlines. See image below: