The venerable cryptographic hash function has vulnerabilities that make its further use inadvisable.Source:: NIST