Vulnerability In The Secutity Method Used For Common Online Security

According to recent research; a vulnerability has been found in the method used for common online security. What is this vulnerability? In what way does it affect the security and what are its disadvantages?
