Vulnerable Web Applications on Developers, Computers Allow Hackers to Bypass Corporate Firewalls A detailed explanation with examples of how malicious hackers can attack vulnerable web applications typically running on developers computers to bypass firewalls and hack other web applications on the local network.