To my knowledge, a unique random salt is assigned to each member.
That means every password hash is unique, even if two passwords are the same.
It also means that malicious administrators (which we don't have at DV) cannot use those password hashes to login to other sites.
The VB login JavaScript code MD5 hashes the password client side, then submits the hash to the server.

Asher is the only one allowed to access the database, and most staff don't have FTP access to DV at all, let alone the database - which is monitored in the unlikely event that anyone who had access would ever try to access it.

Highly unlikely that someone on the net is going to be able to get hold of your unique salt and hash after gaining database access, and then crack that with a custom rainbow table (which requires much space, processing power and/or time, and hope that the password is simple) for a plain text password to then search and login on another website. Even then there's obvious precautions against that, just use different passwords for different sites and keep your password/s strong.