diff --git a/README.md b/README.md
index 9ea6696..cb1fd80 100644
--- a/README.md
+++ b/README.md
@@ -253,6 +253,7 @@
- [CVE-2022-1388-EXP:CVE-2022-1388 F5 BIG-IP RCE 批量检测](https://github.com/bytecaps/CVE-2022-1388-EXP)|[CVE-2022-1388 nuclei 模板](https://github.com/numanturle/CVE-2022-1388)|[CVE-2022-1388:另一个扫描脚本](https://github.com/0xf4n9x/CVE-2022-1388)
- [CVE-2022-24734: MyBB论坛后台 RCE](https://github.com/Altelus1/CVE-2022-24734)
- [CVE-2022-0540:Atlassian Jira Seraph Authentication Bypass RCE](https://github.com/Pear1y/CVE-2022-0540-Preauth-RCE)
+- [CVE-2022-25237:Bonitasoft Platform 从认证绕过到RCE](https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2022-25237)
## 提权辅助相关
@@ -458,6 +459,8 @@
- [CVE-2022-1015:Linux 权限提升漏洞](https://github.com/pqlx/CVE-2022-1015)
+- [CVE-2022-25372:Local Privilege Escalation In Pritunl VPN Client](https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2022-25372)
+
## tools-小工具集版本合
- [java环境下任意文件下载情况自动化读取源码的小工具](https://github.com/Artemis1029/Java_xmlhack)
@@ -1583,6 +1586,7 @@
- [sec-note:记录各语言、框架中危险的sink](https://github.com/haby0/sec-note)
- [JavaVulnSummary:Java漏洞分析汇合](https://github.com/R17a-17/JavaVulnSummary)
- [GetDomainAdmin:获取域控权限的几种方式](https://github.com/JDArmy/GetDomainAdmin)
+- [CVE-2022-25237 Bonitasoft Platform 从认证绕过到未公开反序列化漏洞发现之旅](./books/CVE-2022-25237%20Bonitasoft%20Platform%20从认证绕过到未公开反序列化漏洞发现之旅.pdf)
## 说明
diff --git a/books/CVE-2022-25237 Bonitasoft Platform 从认证绕过到未公开反序列化漏洞发现之旅.pdf b/books/CVE-2022-25237 Bonitasoft Platform 从认证绕过到未公开反序列化漏洞发现之旅.pdf
new file mode 100644
index 0000000..52b5e7e
Binary files /dev/null and b/books/CVE-2022-25237 Bonitasoft Platform 从认证绕过到未公开反序列化漏洞发现之旅.pdf differ