It's largely unknown if there's any emergent behaviour given H1(H2(m)), for any two hash functions H1, H2.
It's fully possible that your Uberhash function has some vulnerability that can be easily exploited regardless of the underlying security of the individual hash functions.
It's fully possible that your Uberhash function has some vulnerability that can be easily exploited regardless of the underlying security of the individual hash functions.