data/reports: add 2 unreviewed reports

  - data/reports/GO-2025-3371.yaml
  - data/reports/GO-2025-3374.yaml

Fixes golang/vulndb#3371
Fixes golang/vulndb#3374

Change-Id: I599258340cc9152f54d07cd92262a32d79c3e84b
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/641495
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Tatiana Bradley <tatianabradley@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
diff --git a/data/osv/GO-2025-3371.json b/data/osv/GO-2025-3371.json
new file mode 100644
index 0000000..5651099
--- /dev/null
+++ b/data/osv/GO-2025-3371.json
@@ -0,0 +1,58 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3371",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "GHSA-2r2v-9pf8-6342"
+  ],
+  "summary": "WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal",
+  "details": "WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/h44z/wg-portal from v2.0.0-alpha.1 before v2.0.0-alpha.3.",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/h44z/wg-portal",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "custom_ranges": [
+          {
+            "type": "ECOSYSTEM",
+            "events": [
+              {
+                "introduced": "2.0.0-alpha.1"
+              },
+              {
+                "fixed": "2.0.0-alpha.3"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/h44z/wg-portal/security/advisories/GHSA-2r2v-9pf8-6342"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/h44z/wg-portal/commit/62dbdfe0f96045d46e121d509fc181fbb7936895"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3371",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3374.json b/data/osv/GO-2025-3374.json
new file mode 100644
index 0000000..529733a
--- /dev/null
+++ b/data/osv/GO-2025-3374.json
@@ -0,0 +1,52 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3374",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-22130",
+    "GHSA-j4jw-m6xr-fv6c"
+  ],
+  "summary": "Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve",
+  "details": "Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/charmbracelet/soft-serve",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "0.8.2"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3374",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3371.yaml b/data/reports/GO-2025-3371.yaml
new file mode 100644
index 0000000..ec8c981
--- /dev/null
+++ b/data/reports/GO-2025-3371.yaml
@@ -0,0 +1,17 @@
+id: GO-2025-3371
+modules:
+    - module: github.com/h44z/wg-portal
+      non_go_versions:
+        - introduced: 2.0.0-alpha.1
+        - fixed: 2.0.0-alpha.3
+      vulnerable_at: 1.0.19
+summary: WireGuard Portal v2 Vulnerable to OAuth Insecure Redirect URI / Account Takeover in github.com/h44z/wg-portal
+ghsas:
+    - GHSA-2r2v-9pf8-6342
+references:
+    - advisory: https://github.com/h44z/wg-portal/security/advisories/GHSA-2r2v-9pf8-6342
+    - fix: https://github.com/h44z/wg-portal/commit/62dbdfe0f96045d46e121d509fc181fbb7936895
+source:
+    id: GHSA-2r2v-9pf8-6342
+    created: 2025-01-08T08:41:43.731247-10:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3374.yaml b/data/reports/GO-2025-3374.yaml
new file mode 100644
index 0000000..84980ec
--- /dev/null
+++ b/data/reports/GO-2025-3374.yaml
@@ -0,0 +1,19 @@
+id: GO-2025-3374
+modules:
+    - module: github.com/charmbracelet/soft-serve
+      versions:
+        - fixed: 0.8.2
+      vulnerable_at: 0.8.1
+summary: Soft Serve vulnerable to path traversal attacks in github.com/charmbracelet/soft-serve
+cves:
+    - CVE-2025-22130
+ghsas:
+    - GHSA-j4jw-m6xr-fv6c
+references:
+    - advisory: https://github.com/charmbracelet/soft-serve/security/advisories/GHSA-j4jw-m6xr-fv6c
+    - fix: https://github.com/charmbracelet/soft-serve/commit/a8d1bf3f9349c138383b65079b7b8ad97fff78f4
+    - web: https://github.com/charmbracelet/soft-serve/releases/tag/v0.8.2
+source:
+    id: GHSA-j4jw-m6xr-fv6c
+    created: 2025-01-08T08:41:22.954732-10:00
+review_status: UNREVIEWED