A cryptosystem comes with an advertised security level. The type of cryptosystem, e.g. collision-resistant hash function (CRHF) or pseudorandom function family (PRF) or public-key key encapsulation mechanism (KEM), tells you what the security level means: usually, an adversary's success probability for some kind of attack as a function of the area*time or AT cost the adversary is willing to spend.
Salsa20 is advertised to be a PRF with a 256-bit security level. Loosely, this means that there is a best standard generic attack, meaning an attack that doesn't depend on the details of Salsa20 but works with any PRF $F_k\colon \{0,1\}^{128} \to \{0,1\}^{512}$ for 256-bit key $k$, that has a certain AT cost, and all other known attacks have worse AT cost.
To distinguish $\mathrm{Salsa20}_k$ for unknown key $k$ from a random function $F\colon \{0,1\}^{128} \to \{0,1\}^{512}$, with probability near 1, the advertised best AT cost is around $2^{256}$, in some sensible choice of commensurate units for (a) Salsa20 circuits, (b) bits of memory, and (c) durations of time. (You can make the units commensurate by choosing the smallest conceivable euro cost of each one. The cost goes down if you are content to break any one of many keys.) This attack works by exhaustively trying all possible values of $k$.
We call the cryptosystem broken if someone demonstrates an attack that does depend on the details of the cryptosystem and has better AT cost—even if it is only AT cost $2^{255}$ instead of the advertised AT cost $2^{256}$. In that case, the advertisement on which everyone might have been relying turns out to be false.
Sometimes we distinguish between ‘theoretical attacks’ like a $2^{255}$-AT attack that could never actually be carried out with our current understanding of humanity's available energy budget, and ‘practical attacks’ like the $2^{64}$-AT attack that yielded a collision in SHA-1, but the boundary is fuzzy and changes over time.
Some people consider only the time cost, not the area cost as well, which is silly because large memory is expensive and not instantaneous, and parallel small-memory attacks nearly always outperform serial large-memory attacks in practice. That's presumably why the Wikipedia page you cite follows the paper citation about an attack on Salsa20/8 with the caveat ‘However, this attack does not seem to be comparative with the brute force attack.’ (although I haven't looked closely at the estimated attack costs to see why they are less notable, other than being a little higher, than those of J.P. Aumasson et al), and why I said there's no evidence to suspect MD5's preimage resistance is broken in an earlier answer in spite of a $2^{123.4}$-time preimage attack on it.
(More details on cost metrics and security notions.)