If you want to play things safe assume every file type and and application is vulnerable. Just because a vulnerability hasn't been reported doesn't mean it's not being heavily exploited. Widespread major exploitations such as the executing malicious code through Microsoft Office applications and Adobe Acrobat were in full use by hackers for many years before hitting the news.
As an information security professional with 10+ Years experience I'd suggest one the following options, in order of least to most involved:
• Trust your security software to do its job. I don't want to start an antivirus war so I'll leave out names and just say you'd be impressed just how good the one that comes with Windows 8/10 is (available by download for 7), and how bad and resource intensive some of the historically well known ones are. It never hurts to have a primary that handles scanning and live monitoring, and double check every so often with a secondary scanner (avoid running two security monitoring products one the same machine, more often than less it causes issues).
• Run the file through cloud heuristics, I prefer HitManPro for this. This could also be used as your secondary scanner as mentioned above. It's rare that it doesn't find something (dormant or not) buried deep in a machine.
• Use a sandbox device, this could be another physical computer or you could use one of the many OS virtualization products to create a virtual machine as your sandbox.
A side note to anyone who wants added network security is to turn off UPnP on your router if it exists and is enabled. That feature allows automatic management network internal/external connections and is often exploited. The recent DynDNS hack that brought down Yahoo and other major sites used hundreds of thousands of devices across the world that were automatically connected to the outside using UPnP. Ever wondered how that new IP/Wifi camera set itself up to allow you to connect to it remotely from your cell phone? In most cases it was using UPnP. Disabling it will require you to open any ports that need to access your network from the outside, but for many users this is never needed, and for those where it is it's a one time configuration per service.
I have over-simplified some of this while trying to provide enough insight to allow one to better protect themselves. At the end of the day though security is a perception. If the person with the right skills really wants to find a way into your systems, they will. I look at preventative measures such as this as ways to "keep the honest from stealing" the equivalent of putting those tiny little locks that can be broken by hand onto a suitcase, or a more extreme example, the dead-bolted front door with a glass pane on the side (smash glass, flip deadbolt, enter home). Even with my background I try not to get too caught up in being overly secure of my systems because I can't even guarantee my home to be 100% secure. I can setup alarms and alerts all day long, secure every door and window, hope for quick police response, and use insurance to cover losses, but none of that protects me from a motivated robber from getting in, it just offers me options after the security has been breached. Wrapping it all up, you lock your doors but how confident are you that your home/car are now protected because of that? (a topic for a different day in cars with the documented RF hacks that are out there) Look at your networked systems the same way and ask yourself what is the right amount of security for me and how much is in my control.
I know this is way more than what the original ask was looking for, but I wanted to take to opportunity to share my knowledge as this community has been so supportive of me as a new member in such a short amount of time. Feel free to remove my post if it is not appropriate.