<rss version="2.0"><channel><title>Cross-Site-Scripting on CRS Project</title><link>https://0d2d0d50.website-1u6.pages.dev/tags/cross-site-scripting/</link><description>Recent content in CRS Project</description><item><title>The Top 5 Ways CRS Can Help You Fight the OWASP Top 10</title><link>https://0d2d0d50.website-1u6.pages.dev/20171121/top-5-ways-crs-can-help-you-fight-owasp-top-10/</link><pubDate>Tue, 21 Nov 2017 16:36:31 +0100</pubDate><description>&lt;p&gt;The new edition &lt;a href="https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010-2017%20%28en%29.pdf"&gt;OWASP Top Ten&lt;/a&gt; list mentions &lt;a href="https://www.modsecurity.org"&gt;ModSecurity&lt;/a&gt; and the &lt;a href="https://coreruleset.org"&gt;OWASP ModSecurity Core Rule Set&lt;/a&gt; for the first time.&lt;/p&gt;
&lt;p&gt;Let me explain you what the Core Rule Set does and how it can help you protect your services from these risks.&lt;/p&gt;
&lt;p&gt;The CRS - short for OWASP ModSecurity Core Rule Set - is a set of generic attack detection rules. They are meant for use with ModSecurity or compatible web application firewalls. The CRS aims to protect web applications from a wide range of attacks with a minimum of false alerts. The Core Rule Set is thus meant as a 1st line of defense against web application attacks as described by the OWASP Top Ten.&lt;/p&gt;</description></item></channel></rss>