Unfortunately, it could with MD5. The truth is, back again in 2004, scientists managed to make two various inputs that gave the identical MD5 hash. This vulnerability may be exploited by negative actors to sneak in malicious info.MD5 continues to be getting used currently to be a hash function Despite the fact that it has been exploited For several