Gender neutral wording

Patch provided by Tom Hudson.

git-svn-id: https://svn.php.net/repository/phpdoc/en/trunk@342184 c90b9560-bf6c-de11-be94-00142212c4b1
This commit is contained in:
Christoph Michael Becker 2017-03-25 12:23:58 +00:00
parent 71c7ae1845
commit 5c93bc6f29

View file

@ -127,7 +127,7 @@ $html = preg_replace(
<para>
The above example code can be easily exploited by passing in a string such as
<literal>&lt;h1&gt;{${eval($_GET[php_code])}}&lt;/h1&gt;</literal>. This gives
the attacker the ability to execute arbitrary PHP code and as such gives him
the attacker the ability to execute arbitrary PHP code and as such gives them
nearly complete access to your server.
</para>
<para>