Sad to say, it could with MD5. The truth is, again in 2004, researchers managed to produce two distinctive inputs that gave the same MD5 hash. This vulnerability can be exploited by lousy actors to sneak in malicious data.To authenticate consumers during the login process, the system hashes their password inputs and compares them towards the stored