The release of the exploit follows days after a security researcher published a proof of concept for the flaw on 17 October. Adobe released a patch for the vulnerability on Monday 22 October.
Details about the vulnerability were published in late September on the GNU Citizen blog. The blog at the time didn't provide proof of concept (PoC) code, because the author anticipated that Adobe would be slow in creating a patch.
The speedy release of attack code following the proof of concept publication once again illustrated that PoC code can easily be turned into a live attack.