To understand the Exploit:JS/CVE-2012-4792 vulnrability you need to know what is Exploit and how it exploits the vulnerability and cause destructive actions.
What is an exploit?
Exploit are actually program code crafty maliciously that takes the advantage of weaknesses (or vulnerabilities) in any legitimate software to intrude inside the proposed PC. A project called “Common Vulnerabilities and Exposures” (CVE) gives each vulnerability a unique number. So in case of Exploit:JS/CVE-2012-4792, “CVE-2012-4792” is the number assigned to the vulnerability.
Exploit:JS/CVE-2012-4792 in context
The following Internet Explorer versions are vulnerable:
• Internet Explorer 6
• Internet Explorer 7
• Internet Explorer 8
Exploit:JS/CVE-2012-4792 vulnerability has been used in watering-hole attack scenarios in the past. It has been deployed in Exploit Kits before, but has been outdated since 2013.
If your antivirus has alerted you about Exploit:JS/CVE-2012-4792 then,
Immediately scan your PC with powerful and effective threat detection tool and remove it from away PC.
• It is very important to keep your software programs up to date and updated should be from verified sources.
• Keep your firewall enabled and configure advanced settings of the browsers.