93 code execution vulns in Chrome since 2015, 135 in FF. 975 memory corruption + 267 overflow for Chrome in that same time, while 142 + 536 respectively for FF, so in raw terms Chrome is higher, but A) most of the Chrome vulns are classified as DoS rather than RCE, which indicates their mitigations seem to work, and B) Chrome has way more market share, hence way more people finding vulns. Ladybird has like, 2 CVEs, but that doesn't mean it's way more secure than FF/Chrome, it means nobody's using it.
Opzero.Ru (the quickest exploit market I could find) will pay $200k for Firefox RCE but $500K for Chrome RCE. Lower prices either mean less demand (low browser market share) or high supply (more vulns already in their inventory.)
So no, I am not fear mongering. You may disagree with my conclusions but I'm trying to be objective.
or maybe the amount of research I could be fucked to do on my phone on a Saturday to reply to some snide lemming topped out at not adding up subranges by hand.
I'm also skeptical of the RCE tallies, the more I look at them, given two JS sandbox escapes for FF were reported just days ago: https://www.mozilla.org/en-US/security/advisories/mfsa2025-73/
I don't understand why so many people on this site take every opportunity to attack each other, rather than extending the principle of charity.