For example, one China-linked group exploited a SQL injection vulnerability six days after proof-of-concept code was published. In another case, two separate actors deployed exploits just two days ...