{"id":26197,"date":"2019-03-18T20:08:09","date_gmt":"2019-03-18T20:08:09","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/"},"modified":"2019-03-18T20:08:09","modified_gmt":"2019-03-18T20:08:09","slug":"bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/","title":{"rendered":"Bad cup of Java leaves nasty taste in IBM Watson&#8217;s &#8216;AI&#8217; mouth: Five security bugs to splat in analytics gear"},"content":{"rendered":"<p>IBM has issued a security alert over five vulnerabilities in its golden boy Watson analytics system.<\/p>\n<p>Big Blue has issued an update today to clean up a series of security flaws in Watson that stem from the analytics system&#8217;s use of Java components. The bugs are present in installations of Watson Explorer and IBM Watson Content Analytics.<\/p>\n<p>In total, <a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg22014682\">IBM says<\/a>, five CVE-listed vulnerabilities are cleared up by the latest update, ranging from information disclosure flaws to remote takeover vulnerabilities.<\/p>\n<p>The most serious of the five bugs is CVE-2018-2633, a flaw in Java SE, Java SE Embedded, and JRockit JNDI that can allow an attacker with local network access to remotely take control of the targeted box. While details of the flaw were not given, the exploit is said to require user interaction.<\/p>\n<p>&#8220;Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products,&#8221; the <a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-2633\">CVE summary<\/a> of the bug reads.<\/p>\n<p>&#8220;Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit&#8221;<\/p>\n<p>While IBM notes that while the flaw is particularly difficult for an attacker to exploit, Watson boxes are a particularly valuable target, so admins would be wise to address the bugs post-haste.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2017\/06\/15\/death_shutterstock.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Death\"><\/p>\n<h2 title=\"Not even using the founder's brand could save Big Blue's Slack for suits\">IBM to kill off Watson&#8230; Workspace from end of February<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2019\/01\/16\/ibm_to_kill_off_watson_workspace_from_end_of_february\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Another flaw, CVE-2018-2603, would allow an attacker to crash the targeted Watson system by initiating a denial of service attack. Unlike the remote takeover bug, this flaw can be more easily exploited by an attacker with local network access, but annoyingly Big Blue was skimpy on details of what made this so.<\/p>\n<p>&#8220;Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit,&#8221; <a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-2603\">the summary<\/a> reads.<\/p>\n<p>&#8220;Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit.&#8221;<\/p>\n<p>The remaining three flaws, CVE-2018-2579, CVE-2018-2588, and CVE-2018-2602, all relate to information disclosure flaws. All of those three would allow an attacker to potentially retrieve sensitive information from the target machine, though Big Blue held off on saying exactly how the flaws were exploited.<\/p>\n<p>Each of the flaws can be patched up by getting the latest version of the Java Runtime. Admins are advised to test and install the patch as soon as possible. \u00ae<\/p>\n<div class=\"boxout\" readability=\"17.645901639344\">\n<p><strong>Speaking of IBM&#8230;<\/strong> If you&#8217;re using Big Blue&#8217;s BigFix relay server, ensure relay authentication is enabled. &#8220;Not doing so exposes a ridiculous amount of information to unauthenticated external attackers, sometimes leading to a full remote compromise,&#8221; infosec bod HD Moore <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.atredis.com\/blog\/2019\/3\/18\/harvesting-data-from-bigfix-relay-servers\">warned today<\/a>.<\/p>\n<p>&#8220;Also note than an attacker who has access to the internal network or to an externally connected system with an authenticated agent can still access the BigFix data, even with Relay Authentication enabled. The best path to preventing a compromise through BigFix is to not include any sensitive content in uploaded packages.&#8221;<\/p>\n<\/div>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7143\/cloud-security-from-start-point-to-end-point?td=wptl1810\">Cloud Security: From Start Point to End Point<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/03\/18\/java_watson_flaws\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Worst brew than that time El Reg went on a road trip and stopped at a Denny&#8217;s IBM has issued a security alert over five vulnerabilities in its golden boy Watson analytics system.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26198,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-26197","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bad cup of Java leaves nasty taste in IBM Watson&#039;s &#039;AI&#039; mouth: Five security bugs to splat in analytics gear 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bad cup of Java leaves nasty taste in IBM Watson&#039;s &#039;AI&#039; mouth: Five security bugs to splat in analytics gear 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-18T20:08:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Bad cup of Java leaves nasty taste in IBM Watson&#8217;s &#8216;AI&#8217; mouth: Five security bugs to splat in analytics gear\",\"datePublished\":\"2019-03-18T20:08:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/\"},\"wordCount\":540,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/\",\"name\":\"Bad cup of Java leaves nasty taste in IBM Watson's 'AI' mouth: Five security bugs to splat in analytics gear 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg\",\"datePublished\":\"2019-03-18T20:08:09+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bad cup of Java leaves nasty taste in IBM Watson&#8217;s &#8216;AI&#8217; mouth: Five security bugs to splat in analytics gear\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bad cup of Java leaves nasty taste in IBM Watson's 'AI' mouth: Five security bugs to splat in analytics gear 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/","og_locale":"en_US","og_type":"article","og_title":"Bad cup of Java leaves nasty taste in IBM Watson's 'AI' mouth: Five security bugs to splat in analytics gear 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-18T20:08:09+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Bad cup of Java leaves nasty taste in IBM Watson&#8217;s &#8216;AI&#8217; mouth: Five security bugs to splat in analytics gear","datePublished":"2019-03-18T20:08:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/"},"wordCount":540,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/","url":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/","name":"Bad cup of Java leaves nasty taste in IBM Watson's 'AI' mouth: Five security bugs to splat in analytics gear 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg","datePublished":"2019-03-18T20:08:09+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/bad-cup-of-java-leaves-nasty-taste-in-ibm-watsons-ai-mouth-five-security-bugs-to-splat-in-analytics-gear\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Bad cup of Java leaves nasty taste in IBM Watson&#8217;s &#8216;AI&#8217; mouth: Five security bugs to splat in analytics gear"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26197"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26197\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26198"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}