Unfortunately, it may possibly with MD5. The truth is, back again in 2004, researchers managed to create two distinctive inputs that gave a similar MD5 hash. This vulnerability might be exploited by poor actors to sneak in destructive info.MD5 continues to be getting used these days being a hash function While it has been exploited For a long time.