For example, one China-linked group exploited a SQL injection vulnerability six days after proof-of-concept code was ...