From 5c93bc6f290af16d22543cb5833504cbcd609596 Mon Sep 17 00:00:00 2001 From: Christoph Michael Becker Date: Sat, 25 Mar 2017 12:23:58 +0000 Subject: [PATCH] Gender neutral wording Patch provided by Tom Hudson. git-svn-id: https://svn.php.net/repository/phpdoc/en/trunk@342184 c90b9560-bf6c-de11-be94-00142212c4b1 --- reference/pcre/pattern.modifiers.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/reference/pcre/pattern.modifiers.xml b/reference/pcre/pattern.modifiers.xml index 057ea80b03..048601edc7 100644 --- a/reference/pcre/pattern.modifiers.xml +++ b/reference/pcre/pattern.modifiers.xml @@ -127,7 +127,7 @@ $html = preg_replace( The above example code can be easily exploited by passing in a string such as <h1>{${eval($_GET[php_code])}}</h1>. This gives - the attacker the ability to execute arbitrary PHP code and as such gives him + the attacker the ability to execute arbitrary PHP code and as such gives them nearly complete access to your server.