Mikogo version 5.4.1.160608 is vulnerable to local credential disclosure. The supplied password is stored as a MD5 hash format in memory. A potential attacker could reveal the supplied password hash and re-use it or store it via the configuration file in order to gain access to the account.
c2e3ddfdce5930e691b46f1bfda8faebea78d304b3f1c56f334c811b5b8cd2bb