data/reports: add 3 unreviewed reports

  - data/reports/GO-2024-3280.yaml
  - data/reports/GO-2024-3281.yaml
  - data/reports/GO-2024-3283.yaml

Fixes golang/vulndb#3280
Fixes golang/vulndb#3281
Fixes golang/vulndb#3283

Change-Id: I86c60e8a8bee592cedb756c99695eabff0de5e5e
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/630755
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/data/osv/GO-2024-3280.json b/data/osv/GO-2024-3280.json
new file mode 100644
index 0000000..09787ab
--- /dev/null
+++ b/data/osv/GO-2024-3280.json
@@ -0,0 +1,61 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2024-3280",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2024-52282",
+    "GHSA-9c5p-35gj-jqp4"
+  ],
+  "summary": "Rancher Helm Applications may have sensitive values leaked in github.com/rancher/rancher",
+  "details": "Rancher Helm Applications may have sensitive values leaked in github.com/rancher/rancher.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/rancher/rancher from v2.8.0 before v2.8.10, from v2.9.0 before v2.9.4.",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/rancher/rancher",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "custom_ranges": [
+          {
+            "type": "ECOSYSTEM",
+            "events": [
+              {
+                "introduced": "2.8.0"
+              },
+              {
+                "fixed": "2.8.10"
+              },
+              {
+                "introduced": "2.9.0"
+              },
+              {
+                "fixed": "2.9.4"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/rancher/rancher/security/advisories/GHSA-9c5p-35gj-jqp4"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2024-3280",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-3281.json b/data/osv/GO-2024-3281.json
new file mode 100644
index 0000000..d0a1f49
--- /dev/null
+++ b/data/osv/GO-2024-3281.json
@@ -0,0 +1,48 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2024-3281",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2024-52280",
+    "GHSA-j5hq-5jcr-xwx7"
+  ],
+  "summary": "github.com/rancher/steve's users can issue watch commands for arbitrary resources in github.com/rancher/steve",
+  "details": "github.com/rancher/steve's users can issue watch commands for arbitrary resources in github.com/rancher/steve",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/rancher/steve",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "0.0.0-20241029132712-2175e090fe4b"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/rancher/steve/security/advisories/GHSA-j5hq-5jcr-xwx7"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/rancher/steve/commit/2175e090fe4b1e603a54e1cdc5148a2b1c11b4d9"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2024-3281",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2024-3283.json b/data/osv/GO-2024-3283.json
new file mode 100644
index 0000000..3ac0db7
--- /dev/null
+++ b/data/osv/GO-2024-3283.json
@@ -0,0 +1,72 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2024-3283",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2024-52309"
+  ],
+  "summary": "SFTPGo allows administrators to restrict command execution from the EventManager in github.com/drakkan/sftpgo",
+  "details": "SFTPGo allows administrators to restrict command execution from the EventManager in github.com/drakkan/sftpgo",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/drakkan/sftpgo",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    },
+    {
+      "package": {
+        "name": "github.com/drakkan/sftpgo/v2",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "2.4.0"
+            },
+            {
+              "fixed": "2.6.3"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52309"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/drakkan/sftpgo/commit/88b1850b5806eee81150873d4e565144b21021fb"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/drakkan/sftpgo/commit/b524da11e9466d05fe03304713ee1c61bb276ec4"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-49cc-xrjf-9qf7"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2024-3283",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2024-3280.yaml b/data/reports/GO-2024-3280.yaml
new file mode 100644
index 0000000..819f70a
--- /dev/null
+++ b/data/reports/GO-2024-3280.yaml
@@ -0,0 +1,20 @@
+id: GO-2024-3280
+modules:
+    - module: github.com/rancher/rancher
+      non_go_versions:
+        - introduced: 2.8.0
+        - fixed: 2.8.10
+        - introduced: 2.9.0
+        - fixed: 2.9.4
+      vulnerable_at: 1.6.30
+summary: Rancher Helm Applications may have sensitive values leaked in github.com/rancher/rancher
+cves:
+    - CVE-2024-52282
+ghsas:
+    - GHSA-9c5p-35gj-jqp4
+references:
+    - advisory: https://github.com/rancher/rancher/security/advisories/GHSA-9c5p-35gj-jqp4
+source:
+    id: GHSA-9c5p-35gj-jqp4
+    created: 2024-11-21T14:39:33.619351-05:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2024-3281.yaml b/data/reports/GO-2024-3281.yaml
new file mode 100644
index 0000000..069898f
--- /dev/null
+++ b/data/reports/GO-2024-3281.yaml
@@ -0,0 +1,21 @@
+id: GO-2024-3281
+modules:
+    - module: github.com/rancher/steve
+      versions:
+        - fixed: 0.0.0-20241029132712-2175e090fe4b
+summary: |-
+    github.com/rancher/steve's users can issue watch commands for arbitrary
+    resources in github.com/rancher/steve
+cves:
+    - CVE-2024-52280
+ghsas:
+    - GHSA-j5hq-5jcr-xwx7
+references:
+    - advisory: https://github.com/rancher/steve/security/advisories/GHSA-j5hq-5jcr-xwx7
+    - fix: https://github.com/rancher/steve/commit/2175e090fe4b1e603a54e1cdc5148a2b1c11b4d9
+notes:
+    - fix: 'github.com/rancher/steve: could not add vulnerable_at: cannot auto-guess when fixed version is 0.0.0 pseudo-version'
+source:
+    id: GHSA-j5hq-5jcr-xwx7
+    created: 2024-11-21T14:39:28.380649-05:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2024-3283.yaml b/data/reports/GO-2024-3283.yaml
new file mode 100644
index 0000000..041c1e5
--- /dev/null
+++ b/data/reports/GO-2024-3283.yaml
@@ -0,0 +1,23 @@
+id: GO-2024-3283
+modules:
+    - module: github.com/drakkan/sftpgo
+      vulnerable_at: 1.2.2
+    - module: github.com/drakkan/sftpgo/v2
+      versions:
+        - introduced: 2.4.0
+        - fixed: 2.6.3
+      vulnerable_at: 2.6.2
+summary: |-
+    SFTPGo allows administrators to restrict command execution from the EventManager
+    in github.com/drakkan/sftpgo
+cves:
+    - CVE-2024-52309
+references:
+    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-52309
+    - fix: https://github.com/drakkan/sftpgo/commit/88b1850b5806eee81150873d4e565144b21021fb
+    - fix: https://github.com/drakkan/sftpgo/commit/b524da11e9466d05fe03304713ee1c61bb276ec4
+    - web: https://github.com/drakkan/sftpgo/security/advisories/GHSA-49cc-xrjf-9qf7
+source:
+    id: CVE-2024-52309
+    created: 2024-11-21T14:38:20.406237-05:00
+review_status: UNREVIEWED