PRIORITY: TEST_TYPE: APPROVED_QE: INPUT: 1. Install Paros browser/tool for intercepting the requests from the device. 2. Configure the proxy of the client Mozilla Firefox browser(Win 7) and paros as "localhost" and port as "8080". FILES: TESTCASE_HEADLINE: Login Page is Vulnerable_Password_Numbers. TESTCASE_VERSION: FEATURE: copy_auditron APPROVE_SE: SPEC_VERSION: MFF: TESTCASE_PLATFORM: SPEC: No Spec HISTORY: CDATE: 1366122116 TESTCASE_APPROVALS: TESTCASE_STATE: OUTPUT: Device should not allow to induce any alert box FILEDESC: PROCESS: RESOURCE_HW: TC_WEIGHTAGE: MDATE: 1366122116, 1386145267, 1425023548, 1441711010, 1462266936, 1462272753 APPROVED_SPAR: SKILL_SET: TESTCASE_SOURCE: APPROVE_QE: TEST_CASE_TYPE: APPROVED_SE: PLANNEDTIMESTAFF: ATM_OWNER: AUTHOR: USWU53873 LOE: ASSOCIATED_TESTCASES: ATM_REQLINK: TRAINING: MUSER: USWU53873, USWU53873, USWU53968, USWU53968, q3SJKS2P, q3SJKS2P GROUP: SUB_FEATURE: SPEC_TAG: Mapping Not Required PROCEDURE: In Paros Tool Navigate through Tools -> Filter and Configure filter like below 1.Replace HTTP request body using defined pattern_Enabled Under this Enter a regular expression as the pattern. Pattern:11 replace with: 2. Click -> OK 3.Open the device CWIS using ip 2. Login (Login name:admin/Password:1111) -> Login RESOURCE_CONSUMEABLES: ATM_LOCKED: APPROVE_SPAR: TESTCASE_PRODUCT: QA_TEAM: FILENAME: ATM_ID: 850005B9-8CF6-1014-BD82-D3DB070CB9C2 ATM_MCOMMENTS: Imported from CSV, Update Requirement Tags., Updated with Spec Details, Imported 'ACTIVE_TEST_SECURITY/ Vulnerability_Testing/ 104503' from suite GDC_DPQA-Secury, Renamed from "DPQA_Security/Vulnerability_Testing/21589"., Renamed from "DPQA_Security/Vulnerability/21589". RESOURCE_MEDIA: ATM_REQCOUNT: 0