diff --git a/MS17-010/README.md b/MS17-010/README.md
index aacdf42..f5c7d3b 100644
--- a/MS17-010/README.md
+++ b/MS17-010/README.md
@@ -19,7 +19,9 @@ msf exploit(ms17_010_eternalblue) > run
```
## References
+
* [Windows2012上如何通过攻击ETERNALBLUE获得Meterpreter反弹](https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw%3D%3D&mid=2247483946&idx=1&sn=cbe2e5a08470d699daeb74d7904581c7&scene=45#wechat_redirect)
* [MS17-017: Microsoft Windows 7 SP1 x86 Privilege Escalation Vulnerability](https://securityonline.info/ms17-017-microsoft-windows-7-sp1-x86-privilege-escalation-vulnerability/)
* [AutoBlue-MS17-010 - an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue](https://github.com/3ndG4me/AutoBlue-MS17-010)
* [MS17-010 EternalSynergy / EternalRomance / EternalChampion aux+exploit modules #9473](https://github.com/rapid7/metasploit-framework/pull/9473)
+* [worawit/MS17-010](https://github.com/worawit/MS17-010)
diff --git a/README.md b/README.md
index 775fe2c..011b15e 100644
--- a/README.md
+++ b/README.md
@@ -7,8 +7,15 @@ windows-kernel-exploits
***
#### 漏洞列表
+
##### #Security Bulletin #KB #Description #Operating System
+- [CVE-2021-33739](https://github.com/mavillon1/CVE-2021-33739-POC) [Microsoft DWM Core Library Elevation of Privilege Vulnerability] (Windows 10, 20)
+- [CVE-2021-1732](https://github.com/KaLendsi/CVE-2021-1732-Exploit) [Windows Win32k Elevation of Privilege Vulnerability] (Windows 10, 2019/20H2)
+- [CVE-2020-0787](https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION) [Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability] (Windows 7/8/10, 2008/2012/2016/2019)
+- [CVE-2020-0796](https://github.com/danigargu/CVE-2020-0796) [A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'] (Windows 1903/1909)
+- [CVE-2019-1458](https://github.com/unamer/CVE-2019-1458) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016)
+- [CVE-2019-0803](https://github.com/ExpLife0011/CVE-2019-0803) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016/2019)
- [CVE-2018-8639](https://github.com/ze0r/CVE-2018-8639-exp) [An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory] (Windows 7/8/10/2008/2012/2016)
- [CVE-2018-1038](https://gist.github.com/xpn/3792ec34d712425a5c47caf5677de5fe) [Windows Kernel Elevation of Privilege Vulnerability] (Windows 7 SP1/Windows Server 2008 R2 SP1)
- [CVE-2018-0743](https://github.com/saaramar/execve_exploit) [Windows Subsystem for Linux Elevation of Privilege Vulnerability] (Windows 10 version 1703/Windows 10 version 1709/Windows Server version 1709)
@@ -76,6 +83,7 @@ windows-kernel-exploits
+ **ourren**(sina weibo @ourren)
+ **hx**(sina weibo @hx)
+ **Bearcat**(github @Bearcat)
++ **CaledoniaProject**(github @CaledoniaProject)
### 免责说明