diff --git a/skf/markdown/code_examples/asp/27-code_example--Session_cookies_(domain)--.md b/skf/markdown/code_examples/asp/27-code_example--Session_cookies_(domain)--.md index fa195ae70..710b01eb0 100644 --- a/skf/markdown/code_examples/asp/27-code_example--Session_cookies_(domain)--.md +++ b/skf/markdown/code_examples/asp/27-code_example--Session_cookies_(domain)--.md @@ -4,7 +4,7 @@ Session cookies (domain) **Example:** /* - Setting the “Domain” attribute to a too permissive value, such as “example.com” + Setting the "Domain" attribute to a too permissive value, such as "example.com" allows an attacker to launch attacks on the session IDs between different hosts and web applications belonging to the same domain, known as cross-subdomain cookies. For example, vulnerabilities in www.example.com might allow an attacker to get access