Errors, Vulnerabilities & Exploits Explained