Which of the following vulnerabilities are associated with real-time operating systems (RTOS)?
1) Buffer overflow
2) Denial of Service (DoS)
3) Cross-Site Scripting (XSS)
4) SQL Injection
5) Remote Code Execution (RCE)