diff --git a/reference/pcre/pattern.modifiers.xml b/reference/pcre/pattern.modifiers.xml index 057ea80b03..048601edc7 100644 --- a/reference/pcre/pattern.modifiers.xml +++ b/reference/pcre/pattern.modifiers.xml @@ -127,7 +127,7 @@ $html = preg_replace( The above example code can be easily exploited by passing in a string such as <h1>{${eval($_GET[php_code])}}</h1>. This gives - the attacker the ability to execute arbitrary PHP code and as such gives him + the attacker the ability to execute arbitrary PHP code and as such gives them nearly complete access to your server.