data/reports: add 5 reports

  - data/reports/GO-2025-3726.yaml
  - data/reports/GO-2025-3733.yaml
  - data/reports/GO-2025-3734.yaml
  - data/reports/GO-2025-3736.yaml
  - data/reports/GO-2025-3737.yaml

Fixes golang/vulndb#3726
Fixes golang/vulndb#3733
Fixes golang/vulndb#3734
Fixes golang/vulndb#3736
Fixes golang/vulndb#3737

Change-Id: I2d0413842353ae871b11f80c83c5c40994bb0665
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/678495
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Damien Neil <dneil@google.com>
Auto-Submit: Neal Patel <nealpatel@google.com>
diff --git a/data/osv/GO-2025-3726.json b/data/osv/GO-2025-3726.json
new file mode 100644
index 0000000..cd5b6a8
--- /dev/null
+++ b/data/osv/GO-2025-3726.json
@@ -0,0 +1,65 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3726",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2020-36846"
+  ],
+  "summary": "IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library in github.com/google/brotli",
+  "details": "IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow in the bundled Brotli C library in github.com/google/brotli",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/google/brotli",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36846"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/google/brotli/pull/826"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/advisories/GHSA-5v8v-66v8-mwm7"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/timlegge/perl-IO-Compress-Brotli/blob/8b44c83b23bb4658179e1494af4b725a1bc476bc/Changes#L52"
+    },
+    {
+      "type": "WEB",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8927"
+    }
+  ],
+  "credits": [
+    {
+      "name": "Robert Rothenberg (RRWO)"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3726",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3733.json b/data/osv/GO-2025-3733.json
new file mode 100644
index 0000000..8d16e60
--- /dev/null
+++ b/data/osv/GO-2025-3733.json
@@ -0,0 +1,56 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3733",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-48948",
+    "GHSA-f238-rggp-82m3"
+  ],
+  "summary": "Navidrome Transcoding Permission Bypass Vulnerability Report in github.com/navidrome/navidrome",
+  "details": "Navidrome Transcoding Permission Bypass Vulnerability Report in github.com/navidrome/navidrome",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/navidrome/navidrome",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "0.56.0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3"
+    },
+    {
+      "type": "ADVISORY",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48948"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/navidrome/navidrome/commit/e5438552c63fecb6284e1b179dddae91ede869c8"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/navidrome/navidrome/pull/4096"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3733",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3734.json b/data/osv/GO-2025-3734.json
new file mode 100644
index 0000000..d36e373
--- /dev/null
+++ b/data/osv/GO-2025-3734.json
@@ -0,0 +1,52 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3734",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-48949",
+    "GHSA-5wgp-vjxm-3x2r"
+  ],
+  "summary": "Navidrome allows SQL Injection via role parameter in github.com/navidrome/navidrome",
+  "details": "Navidrome allows SQL Injection via role parameter in github.com/navidrome/navidrome",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/navidrome/navidrome",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0.55.0"
+            },
+            {
+              "fixed": "0.56.0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/navidrome/navidrome/security/advisories/GHSA-5wgp-vjxm-3x2r"
+    },
+    {
+      "type": "ADVISORY",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48949"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/navidrome/navidrome/commit/b19d5f0d3e079639904cac95735228f445c798b6"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3734",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3736.json b/data/osv/GO-2025-3736.json
new file mode 100644
index 0000000..49644e7
--- /dev/null
+++ b/data/osv/GO-2025-3736.json
@@ -0,0 +1,63 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3736",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-48495",
+    "GHSA-4xg4-54hm-9j77"
+  ],
+  "summary": "Gokapi has stored XSS vulnerability in friendly name for API keys in github.com/forceu/gokapi",
+  "details": "Gokapi has stored XSS vulnerability in friendly name for API keys in github.com/forceu/gokapi.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/forceu/gokapi before v2.0.0.",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/forceu/gokapi",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "custom_ranges": [
+          {
+            "type": "ECOSYSTEM",
+            "events": [
+              {
+                "introduced": "0"
+              },
+              {
+                "fixed": "2.0.0"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/Forceu/Gokapi/security/advisories/GHSA-4xg4-54hm-9j77"
+    },
+    {
+      "type": "ADVISORY",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48495"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/Forceu/Gokapi/commit/65ddbc68fbfdf1c80cadb477f4bcbb7f2c4fdbf8"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3736",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3737.json b/data/osv/GO-2025-3737.json
new file mode 100644
index 0000000..b1a83d4
--- /dev/null
+++ b/data/osv/GO-2025-3737.json
@@ -0,0 +1,67 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3737",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-48494",
+    "GHSA-95rc-wc32-gm53"
+  ],
+  "summary": "Gokapi vulnerable to stored XSS via uploading file with malicious file name in github.com/forceu/gokapi",
+  "details": "Gokapi vulnerable to stored XSS via uploading file with malicious file name in github.com/forceu/gokapi.\n\nNOTE: The source advisory for this report contains additional versions that could not be automatically mapped to standard Go module versions.\n\n(If this is causing false-positive reports from vulnerability scanners, please suggest an edit to the report.)\n\nThe additional affected modules and versions are: github.com/forceu/gokapi before v2.0.0.",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/forceu/gokapi",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "custom_ranges": [
+          {
+            "type": "ECOSYSTEM",
+            "events": [
+              {
+                "introduced": "0"
+              },
+              {
+                "fixed": "2.0.0"
+              }
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53"
+    },
+    {
+      "type": "ADVISORY",
+      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48494"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/Forceu/Gokapi/releases/tag/v2.0.0"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3737",
+    "review_status": "UNREVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3726.yaml b/data/reports/GO-2025-3726.yaml
new file mode 100644
index 0000000..523c29a
--- /dev/null
+++ b/data/reports/GO-2025-3726.yaml
@@ -0,0 +1,24 @@
+id: GO-2025-3726
+modules:
+    - module: github.com/google/brotli
+      unsupported_versions:
+        - cve_version_range: 'affected from 0 before 0.007 (default: unaffected)'
+      vulnerable_at: 1.1.0
+summary: |-
+    IO::Compress::Brotli versions prior to 0.007 for Perl have an integer overflow
+    in the bundled Brotli C library in github.com/google/brotli
+cves:
+    - CVE-2020-36846
+credits:
+    - Robert Rothenberg (RRWO)
+references:
+    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2020-36846
+    - fix: https://github.com/google/brotli/commit/223d80cfbec8fd346e32906c732c8ede21f0cea6
+    - fix: https://github.com/google/brotli/pull/826
+    - web: https://github.com/advisories/GHSA-5v8v-66v8-mwm7
+    - web: https://github.com/timlegge/perl-IO-Compress-Brotli/blob/8b44c83b23bb4658179e1494af4b725a1bc476bc/Changes#L52
+    - web: https://nvd.nist.gov/vuln/detail/CVE-2020-8927
+source:
+    id: CVE-2020-36846
+    created: 2025-06-03T13:24:22.322344-04:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3733.yaml b/data/reports/GO-2025-3733.yaml
new file mode 100644
index 0000000..5426950
--- /dev/null
+++ b/data/reports/GO-2025-3733.yaml
@@ -0,0 +1,20 @@
+id: GO-2025-3733
+modules:
+    - module: github.com/navidrome/navidrome
+      versions:
+        - fixed: 0.56.0
+      vulnerable_at: 0.55.2
+summary: Navidrome Transcoding Permission Bypass Vulnerability Report in github.com/navidrome/navidrome
+cves:
+    - CVE-2025-48948
+ghsas:
+    - GHSA-f238-rggp-82m3
+references:
+    - advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-f238-rggp-82m3
+    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48948
+    - fix: https://github.com/navidrome/navidrome/commit/e5438552c63fecb6284e1b179dddae91ede869c8
+    - fix: https://github.com/navidrome/navidrome/pull/4096
+source:
+    id: GHSA-f238-rggp-82m3
+    created: 2025-06-03T13:21:13.171219-04:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3734.yaml b/data/reports/GO-2025-3734.yaml
new file mode 100644
index 0000000..fb94c7f
--- /dev/null
+++ b/data/reports/GO-2025-3734.yaml
@@ -0,0 +1,20 @@
+id: GO-2025-3734
+modules:
+    - module: github.com/navidrome/navidrome
+      versions:
+        - introduced: 0.55.0
+        - fixed: 0.56.0
+      vulnerable_at: 0.55.2
+summary: Navidrome allows SQL Injection via role parameter in github.com/navidrome/navidrome
+cves:
+    - CVE-2025-48949
+ghsas:
+    - GHSA-5wgp-vjxm-3x2r
+references:
+    - advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-5wgp-vjxm-3x2r
+    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48949
+    - fix: https://github.com/navidrome/navidrome/commit/b19d5f0d3e079639904cac95735228f445c798b6
+source:
+    id: GHSA-5wgp-vjxm-3x2r
+    created: 2025-06-03T13:21:08.443051-04:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3736.yaml b/data/reports/GO-2025-3736.yaml
new file mode 100644
index 0000000..ad75525
--- /dev/null
+++ b/data/reports/GO-2025-3736.yaml
@@ -0,0 +1,21 @@
+id: GO-2025-3736
+modules:
+    - module: github.com/forceu/gokapi
+      non_go_versions:
+        - fixed: 2.0.0
+      vulnerable_at: 1.9.6
+summary: |-
+    Gokapi has stored XSS vulnerability in friendly name for API keys in
+    github.com/forceu/gokapi
+cves:
+    - CVE-2025-48495
+ghsas:
+    - GHSA-4xg4-54hm-9j77
+references:
+    - advisory: https://github.com/Forceu/Gokapi/security/advisories/GHSA-4xg4-54hm-9j77
+    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48495
+    - web: https://github.com/Forceu/Gokapi/commit/65ddbc68fbfdf1c80cadb477f4bcbb7f2c4fdbf8
+source:
+    id: GHSA-4xg4-54hm-9j77
+    created: 2025-06-03T13:21:03.26262-04:00
+review_status: UNREVIEWED
diff --git a/data/reports/GO-2025-3737.yaml b/data/reports/GO-2025-3737.yaml
new file mode 100644
index 0000000..71dbe66
--- /dev/null
+++ b/data/reports/GO-2025-3737.yaml
@@ -0,0 +1,22 @@
+id: GO-2025-3737
+modules:
+    - module: github.com/forceu/gokapi
+      non_go_versions:
+        - fixed: 2.0.0
+      vulnerable_at: 1.9.6
+summary: |-
+    Gokapi vulnerable to stored XSS via uploading file with malicious file name in
+    github.com/forceu/gokapi
+cves:
+    - CVE-2025-48494
+ghsas:
+    - GHSA-95rc-wc32-gm53
+references:
+    - advisory: https://github.com/Forceu/Gokapi/security/advisories/GHSA-95rc-wc32-gm53
+    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2025-48494
+    - web: https://github.com/Forceu/Gokapi/commit/343cc566cfd7f4efcd522c92371561d494aed6b0
+    - web: https://github.com/Forceu/Gokapi/releases/tag/v2.0.0
+source:
+    id: GHSA-95rc-wc32-gm53
+    created: 2025-06-03T13:20:57.447384-04:00
+review_status: UNREVIEWED