A vulnerability is a weak point in a system. This implies a risk, especially to confidential information. An exploit is a means of taking advantage of the vulnerability and using it to take advantage of a system or network. Just because something has been identified as a vulnerability doesn't mean that it has been used to compromise a system. The presence of the exploit means someone has successfully used that weakness and taken advantage of it.
It depends on what you mean by censorship. You can write anything that you want on your computer. You can create anything that you can imagine... but you cannot expoit children. If your computer is not connected to the outside world, it's pretty much up to you what you do with it. As soon as you connect to others, Communication laws are in effect which limits what can and cannot be sent across public communication media. Communication laws have been in effect pretty much since the early history of the telephone.
The Africans were used to working, especially in hot conditions.