Verify that that cursors weakly hold script value properties On success, you will see a series of "PASS" messages, followed by "TEST COMPLETE". indexedDB = self.indexedDB || self.webkitIndexedDB || self.mozIndexedDB || self.msIndexedDB || self.OIndexedDB; dbname = "cursor-leak.html" indexedDB.deleteDatabase(dbname) indexedDB.open(dbname) PASS cursorObserver.wasCollected is true PASS successfullyParsed is true TEST COMPLETE