These use the fact that after block decryption, if the last byte is N then the last N bytes must be equal to N. Using the encryption and decryption properties of the cipher a brute force attack can be launched to incrementally determine the last byte of the plaintext, the next-to-last byte, etc. More information at
http://www.skullsecurity.org/blog/2013/padding-oracle-attacks-in-depth.