Comment by layer8

2 years ago

Probably because Explorer hosts shell hooks which can potentially execute arbitrary code.

Just one example: File icons or thumbnails can be dynamically generated by shell extensions based on the file contents. A maliciously crafted file could potentially exploit a vulnerability in such a shell extension.