diff --git a/docs/framework/configure-apps/file-schema/network/schemesettings-element-uri-settings.md b/docs/framework/configure-apps/file-schema/network/schemesettings-element-uri-settings.md index 51c5804a3b464..f66fae81ddcf9 100644 --- a/docs/framework/configure-apps/file-schema/network/schemesettings-element-uri-settings.md +++ b/docs/framework/configure-apps/file-schema/network/schemesettings-element-uri-settings.md @@ -53,7 +53,7 @@ Specifies how a will be parsed for specific schemes. For this reason, class first un-escapes path delimiters and then applies path compression. The result of passing the malicious URL above to class constructor results in the following URI: - `http://www.microsoft.com/Windows/System32/cmd.exe?/c+dir+c:\` + `http://www.contoso.com/Windows/System32/cmd.exe?/c+dir+c:\` This default behavior can be modified to not un-escape percent encoded path delimiters using the schemeSettings configuration option for a specific scheme.