PENETRATING INTEL'S VULNERABILITIES: A COMPREHENSIVE ANALYSIS OF ZINTEL AND XSS EXPLOITS