data/reports: add 3 high-priority reports

  - data/reports/GO-2025-3722.yaml
  - data/reports/GO-2025-3732.yaml
  - data/reports/GO-2025-3735.yaml

Fixes golang/vulndb#3722
Fixes golang/vulndb#3732
Fixes golang/vulndb#3735

Change-Id: Ibb189a18fbfbf60aa63de5bfbd7bb4db1d4467d1
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/678455
Auto-Submit: Neal Patel <nealpatel@google.com>
Reviewed-by: Damien Neil <dneil@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/data/osv/GO-2025-3722.json b/data/osv/GO-2025-3722.json
new file mode 100644
index 0000000..d0bf147
--- /dev/null
+++ b/data/osv/GO-2025-3722.json
@@ -0,0 +1,62 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3722",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-48865",
+    "GHSA-q7p4-7xjv-j3wf"
+  ],
+  "summary": "Fabio allows HTTP clients to manipulate custom headers it adds in github.com/fabiolb/fabio",
+  "details": "Fabio allows HTTP clients to manipulate custom headers it adds in github.com/fabiolb/fabio",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/fabiolb/fabio",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "1.6.6"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "github.com/fabiolb/fabio/proxy",
+            "symbols": [
+              "HTTPProxy.ServeHTTP",
+              "addHeaders"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/fabiolb/fabio/releases/tag/v1.6.6"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3722",
+    "review_status": "REVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3732.json b/data/osv/GO-2025-3732.json
new file mode 100644
index 0000000..dbd1c10
--- /dev/null
+++ b/data/osv/GO-2025-3732.json
@@ -0,0 +1,58 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3732",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-48938",
+    "GHSA-g9f5-x53j-h563"
+  ],
+  "summary": "GitHub CLI and extensions can execute arbitrary commands on compromised GitHub Enterprise Server in github.com/cli/go-gh",
+  "details": "GitHub CLI and extensions can execute arbitrary commands on compromised GitHub Enterprise Server in github.com/cli/go-gh",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/cli/go-gh/v2",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "2.12.1"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "github.com/cli/go-gh/v2/pkg/browser",
+            "symbols": [
+              "Browser.Browse",
+              "Browser.browse"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/cli/go-gh/security/advisories/GHSA-g9f5-x53j-h563"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3732",
+    "review_status": "REVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3735.json b/data/osv/GO-2025-3735.json
new file mode 100644
index 0000000..17a0476
--- /dev/null
+++ b/data/osv/GO-2025-3735.json
@@ -0,0 +1,64 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3735",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-29785",
+    "GHSA-j972-j939-p2v3"
+  ],
+  "summary": "Panic in Path Probe Loss Recovery Handling in github.com/quic-go/quic-go",
+  "details": "Panic in Path Probe Loss Recovery Handling in github.com/quic-go/quic-go",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/quic-go/quic-go",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0.50.0"
+            },
+            {
+              "fixed": "0.50.1"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "github.com/quic-go/quic-go/internal/ackhandler",
+            "symbols": [
+              "sentPacketHandler.OnLossDetectionTimeout",
+              "sentPacketHandler.ReceivedAck",
+              "sentPacketHandler.detectAndRemoveAckedPackets",
+              "sentPacketHandler.detectLostPathProbes"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-j972-j939-p2v3"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/quic-go/quic-go/commit/b90058aba5f65f48e0e150c89bbaa21a72dda4de"
+    },
+    {
+      "type": "REPORT",
+      "url": "https://github.com/quic-go/quic-go/issues/4981"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3735",
+    "review_status": "REVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3722.yaml b/data/reports/GO-2025-3722.yaml
new file mode 100644
index 0000000..20ed699
--- /dev/null
+++ b/data/reports/GO-2025-3722.yaml
@@ -0,0 +1,27 @@
+id: GO-2025-3722
+modules:
+    - module: github.com/fabiolb/fabio
+      versions:
+        - fixed: 1.6.6
+      vulnerable_at: 1.6.5
+      packages:
+        - package: github.com/fabiolb/fabio/proxy
+          symbols:
+            - addHeaders
+          derived_symbols:
+            - HTTPProxy.ServeHTTP
+summary: |-
+    Fabio allows HTTP clients to manipulate custom headers it adds in
+    github.com/fabiolb/fabio
+cves:
+    - CVE-2025-48865
+ghsas:
+    - GHSA-q7p4-7xjv-j3wf
+references:
+    - advisory: https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf
+    - fix: https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3
+    - web: https://github.com/fabiolb/fabio/releases/tag/v1.6.6
+source:
+    id: GHSA-q7p4-7xjv-j3wf
+    created: 2025-06-03T11:54:28.911416-04:00
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3732.yaml b/data/reports/GO-2025-3732.yaml
new file mode 100644
index 0000000..d2a38d4
--- /dev/null
+++ b/data/reports/GO-2025-3732.yaml
@@ -0,0 +1,26 @@
+id: GO-2025-3732
+modules:
+    - module: github.com/cli/go-gh/v2
+      versions:
+        - fixed: 2.12.1
+      vulnerable_at: 2.12.0
+      packages:
+        - package: github.com/cli/go-gh/v2/pkg/browser
+          symbols:
+            - Browser.browse
+          derived_symbols:
+            - Browser.Browse
+summary: |-
+    GitHub CLI and extensions can execute arbitrary commands on
+    compromised GitHub Enterprise Server in github.com/cli/go-gh
+cves:
+    - CVE-2025-48938
+ghsas:
+    - GHSA-g9f5-x53j-h563
+references:
+    - advisory: https://github.com/cli/go-gh/security/advisories/GHSA-g9f5-x53j-h563
+    - fix: https://github.com/cli/go-gh/commit/a08820a13f257d6c5b4cb86d37db559ec6d14577
+source:
+    id: GHSA-g9f5-x53j-h563
+    created: 2025-06-03T11:45:17.659032-04:00
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3735.yaml b/data/reports/GO-2025-3735.yaml
new file mode 100644
index 0000000..1dd3eab
--- /dev/null
+++ b/data/reports/GO-2025-3735.yaml
@@ -0,0 +1,30 @@
+id: GO-2025-3735
+modules:
+    - module: github.com/quic-go/quic-go
+      versions:
+        - introduced: 0.50.0
+        - fixed: 0.50.1
+      vulnerable_at: 0.50.0
+      packages:
+        - package: github.com/quic-go/quic-go/internal/ackhandler
+          symbols:
+            - sentPacketHandler.detectLostPathProbes
+            - sentPacketHandler.detectAndRemoveAckedPackets
+          derived_symbols:
+            - sentPacketHandler.OnLossDetectionTimeout
+            - sentPacketHandler.ReceivedAck
+summary: |-
+    Panic in Path Probe Loss Recovery Handling in
+    github.com/quic-go/quic-go
+cves:
+    - CVE-2025-29785
+ghsas:
+    - GHSA-j972-j939-p2v3
+references:
+    - advisory: https://github.com/quic-go/quic-go/security/advisories/GHSA-j972-j939-p2v3
+    - fix: https://github.com/quic-go/quic-go/commit/b90058aba5f65f48e0e150c89bbaa21a72dda4de
+    - report: https://github.com/quic-go/quic-go/issues/4981
+source:
+    id: GHSA-j972-j939-p2v3
+    created: 2025-06-03T11:45:22.779433-04:00
+review_status: REVIEWED