A curated database of JavaScript engine CVEs with proof-of-concept exploits for security research.
js-vuln-db is a curated database of Common Vulnerabilities and Exposures (CVEs) affecting JavaScript engines, complete with proof-of-concept exploits. It organizes vulnerabilities by engine (V8, ChakraCore, JavaScriptCore, etc.) and provides details like affected features, keywords, and researcher credits. The project addresses the need for a centralized, accessible resource for studying historical JavaScript engine security flaws.
Security researchers, vulnerability analysts, and low-level JavaScript developers interested in engine internals, exploit development, or historical security trends.
It offers a structured, PoC-inclusive database that saves researchers time compared to scattered sources. The focus on JavaScript engines makes it uniquely valuable for browser and runtime security analysis.
A collection of JavaScript engine CVEs with PoCs
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Vulnerabilities are organized by JavaScript engine (e.g., V8, ChakraCore) in separate tables, making it easy to focus on specific runtimes for analysis.
Many entries include PoC code, enabling hands-on reproduction and study of exploits, as highlighted in the project description.
Each CVE attributes discoveries to top security teams like Google Project Zero and Qihoo 360, providing valuable context and recognition.
The database spans CVEs from 2013 onward, offering a timeline to analyze security evolution in JavaScript engines over time.
Some vulnerabilities list '?' for credits or have sparse details, indicating gaps that reduce the database's completeness and reliability.
The project appears unmaintained with no update mechanism; for instance, the latest entries are from 2019, missing recent CVEs.
As a collection of raw markdown files, it lacks advanced filtering, search, or API access, making data extraction cumbersome.