Sadly, it could possibly with MD5. Actually, again in 2004, researchers managed to generate two different inputs that gave exactly the same MD5 hash. This vulnerability might be exploited by lousy actors to sneak in destructive data. Small hash output. The 128-bit hash price made by MD5 is pretty compact, https://spencerzungy.blognody.com/35780848/considerations-to-know-about-what-is-md5-technology