MD5 vs SHA-1 vs SHA-2 - Which is the Most Secure

Mar 12, 2010 ThinkPHP Remote Code Execution (RCE) bug is actively being ThinkPHP has recently released a security update to fix an unauthenticated high risk remote code execution(RCE) vulnerability. This is due to insufficient validation of the controller name passed in the url, leading to possible getshell vulnerability without the forced routing option enabled. MD5 Collision Vulnerability FAQ - DigiCert

Feb 26, 2020

I know that MD5 is the most vulnerable hashing algorithm, and particularly vulnerable to Collisions. But the collision vulnerability is not very risky and somebody might use that as an advantage, but that's with sheer luck. OK, let's say I store passwords using MD5.

Ldapwiki: DIGEST-MD5

MD5 - Message Digest Algorithm Hash Collision - Multiple MD5 - Message Digest Algorithm Hash Collision. CVE-2004-2761CVE-45127 . dos exploit for Multiple platform MD5 vs SHA-1 vs SHA-2 - Which is the Most Secure Mar 26, 2020