Weaknesses in the MD5 algorithm allow for collisions in output. As a result, attackers can generate cryptographic tokens or other data that illegitimately appear to be authentic. Reference Link: http://www.kb.cert.org/vuls/id/836068 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2761
-