How can there be a risk ? The html code is generated server side, not client side. If a user (evil) has access to the server, well then he may just select all files and press delete ... that's the same risk.
I tried <?php eval($this->html); ?> and also <?php echo eval($this->html); ?> But it doesn't work: Parse error: parse error in C:\Data\websites\cms\application\modules\admin\views\scripts\interface\view.phtml(1) : eval()'d code on line 1 -- View this message in context: http://n4.nabble.com/Echo-a-string-containing-the-full-php-webpage-issue-tp1459193p1459367.html Sent from the Zend Framework mailing list archive at Nabble.com.
