Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Probably because Explorer hosts shell hooks which can potentially execute arbitrary code.

Just one example: File icons or thumbnails can be dynamically generated by shell extensions based on the file contents. A maliciously crafted file could potentially exploit a vulnerability in such a shell extension.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: