How can there be a risk ?
The html code is generated server side, not client side.
If a user (evil) has access to the server, well then he may just select all
files and press delete ... that's the same risk.

I tried
<?php eval($this->html); ?>
and also
<?php echo eval($this->html); ?>

But it doesn't work:
Parse error: parse error in
C:\Data\websites\cms\application\modules\admin\views\scripts\interface\view.phtml(1)
: eval()'d code on line 1
-- 
View this message in context: 
http://n4.nabble.com/Echo-a-string-containing-the-full-php-webpage-issue-tp1459193p1459367.html
Sent from the Zend Framework mailing list archive at Nabble.com.

Reply via email to