Title: Hacker Sig Exploit in database.sql
Last modified: February 7, 2017

---

# Hacker Sig Exploit in database.sql

 *  Resolved [Branky](https://wordpress.org/support/users/branky/)
 * (@branky)
 * [9 years, 1 month ago](https://wordpress.org/support/topic/hacker-sig-exploit-in-database-sql/)
 * Dear Gentlemans. After using All in one wp migration, I picked up “Hacker Sig
   Exploit” in database.sql
    Log:
 * ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    Feb 7 09:54:46 sodium
   cxs[502289]: [‘/home/fotohrco/public_html/wp-content/plugins/all-in-one-wp-migration/
   storage/y3ufh6czysao/database.sql’] – (quarantined to /home/quarantine/cxsuser/
   fotohrco/database.sql.1486457686_1) Known exploit = [Fingerprint Match] [Hacker
   Sig Exploit [P1271]] (md5sum:f6b4ab4f81c1c0bb2d61f08cbed9d9e0) ~~~~~~~~~~~~~~
   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Viewing 4 replies - 1 through 4 (of 4 total)

 *  [pluginvulnerabilities](https://wordpress.org/support/users/pluginvulnerabilities/)
 * (@pluginvulnerabilities)
 * [9 years, 1 month ago](https://wordpress.org/support/topic/hacker-sig-exploit-in-database-sql/#post-8752160)
 * Since that file should contain the contents of your database, that is likely 
   either a false positive or you already had something malicious contained in your
   database. Unless whatever produced that result is designed to scan database backups,
   it would seem more likely to be a false positive. Have you checked with the source
   of that message to confirm that it is not a false positive?
 *  Thread Starter [Branky](https://wordpress.org/support/users/branky/)
 * (@branky)
 * [9 years, 1 month ago](https://wordpress.org/support/topic/hacker-sig-exploit-in-database-sql/#post-8757732)
 * This message i received from official web hosting provider. their antivirus scanner
   reported it immediately. It is possible that is false positive. I already use
   this plugin before, without any troubles.
 *  [posetion](https://wordpress.org/support/users/posetion/)
 * (@posetion)
 * [9 years, 1 month ago](https://wordpress.org/support/topic/hacker-sig-exploit-in-database-sql/#post-8793602)
 * Hi there! Having the same issue:
 *  ~/public_html/wp-content/cache/object/bca/e86/bcae8634ef2bb12c8d87563f1f4fa52e.
   php
    Known exploit = [Fingerprint Match] [Hacker Sig Exploit [P1271]]
 * I used to use All-in-One WP Migration but deleted it about a month ago. Any progress
   here?
 * Thank you
 *  Plugin Author [Borislav Angelov](https://wordpress.org/support/users/bangelov/)
 * (@bangelov)
 * [9 years, 1 month ago](https://wordpress.org/support/topic/hacker-sig-exploit-in-database-sql/#post-8793687)
 * Hi
 * When we do export, we archive the database and the files under ./wp-content directory
   so if that exploit exists on your source site, it will be imported on your destination
   site. We don’t have security check or any other scanning performed on export/
   import. To avoid these issues, please keep your WordPress up to date and you 
   can use some of the other plugins that do scanning and protecting.
 * Best Regards,
    Bobby

Viewing 4 replies - 1 through 4 (of 4 total)

The topic ‘Hacker Sig Exploit in database.sql’ is closed to new replies.

 * ![](https://ps.w.org/all-in-one-wp-migration/assets/icon-256x256.png?rev=2458334)
 * [All-in-One WP Migration and Backup](https://wordpress.org/plugins/all-in-one-wp-migration/)
 * [Frequently Asked Questions](https://wordpress.org/plugins/all-in-one-wp-migration/#faq)
 * [Support Threads](https://wordpress.org/support/plugin/all-in-one-wp-migration/)
 * [Active Topics](https://wordpress.org/support/plugin/all-in-one-wp-migration/active/)
 * [Unresolved Topics](https://wordpress.org/support/plugin/all-in-one-wp-migration/unresolved/)
 * [Reviews](https://wordpress.org/support/plugin/all-in-one-wp-migration/reviews/)

## Tags

 * [vulnerable](https://wordpress.org/support/topic-tag/vulnerable/)

 * 4 replies
 * 4 participants
 * Last reply from: [Borislav Angelov](https://wordpress.org/support/users/bangelov/)
 * Last activity: [9 years, 1 month ago](https://wordpress.org/support/topic/hacker-sig-exploit-in-database-sql/#post-8793687)
 * Status: resolved