Rather than the current situation, where they can pwn machines after the exploit is made public?
Yes. After the exploit is made public, the window of opportunity closes quickly.
Yes. After the exploit is made public, the window of opportunity closes quickly.