This is actually the first post in a series, where each post will explain a different vulnerability in plain english. Please suggest other vulnerability types that are hard to understand, and we will take that into account when writing the following posts. :)