data/reports: add 3 REVIEWED reports

  - data/reports/GO-2025-3892.yaml
  - data/reports/GO-2025-3900.yaml
  - data/reports/GO-2025-3912.yaml

Fixes golang/vulndb#3892
Fixes golang/vulndb#3900
Fixes golang/vulndb#3912

Change-Id: I058f7410a046de0c251243b04582b6f509f09c8b
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/699495
Reviewed-by: Ethan Lee <ethanalee@google.com>
Reviewed-by: Neal Patel <nealpatel@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
diff --git a/data/osv/GO-2025-3892.json b/data/osv/GO-2025-3892.json
new file mode 100644
index 0000000..5270148
--- /dev/null
+++ b/data/osv/GO-2025-3892.json
@@ -0,0 +1,71 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3892",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-8959",
+    "GHSA-wjrx-6529-hcj3"
+  ],
+  "summary": "HashiCorp go-getter Vulnerable to Symlink Attacks in github.com/hashicorp/go-getter",
+  "details": "HashiCorp go-getter Vulnerable to Symlink Attacks in github.com/hashicorp/go-getter",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/hashicorp/go-getter",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "1.7.9"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "github.com/hashicorp/go-getter",
+            "symbols": [
+              "Client.ChecksumFromFile",
+              "Client.Get",
+              "FolderStorage.Get",
+              "Get",
+              "GetAny",
+              "GetFile",
+              "GitGetter.Get",
+              "GitGetter.GetFile",
+              "GitGetter.fetchSubmodules",
+              "HttpGetter.Get",
+              "copyDir"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/advisories/GHSA-wjrx-6529-hcj3"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/hashicorp/go-getter/commit/87541b2501c00df5eaedea6acc61a2a4a4efa5b7"
+    },
+    {
+      "type": "WEB",
+      "url": "https://discuss.hashicorp.com/t/hcsec-2025-23-hashicorp-go-getter-vulnerable-to-arbitrary-read-through-symlink-attack/76242"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3892",
+    "review_status": "REVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3900.json b/data/osv/GO-2025-3900.json
new file mode 100644
index 0000000..30bc0fd
--- /dev/null
+++ b/data/osv/GO-2025-3900.json
@@ -0,0 +1,99 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3900",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "GHSA-2464-8j7c-4cjm"
+  ],
+  "summary": "Go-viper's mapstructure May Leak Sensitive Information in Logs in github.com/go-viper/mapstructure",
+  "details": "Go-viper's mapstructure May Leak Sensitive Information in Logs in github.com/go-viper/mapstructure",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/go-viper/mapstructure",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {}
+    },
+    {
+      "package": {
+        "name": "github.com/go-viper/mapstructure/v2",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "2.4.0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "github.com/go-viper/mapstructure/v2",
+            "symbols": [
+              "Decoder.decodeBool",
+              "Decoder.decodeFloat",
+              "Decoder.decodeInt",
+              "Decoder.decodeUint",
+              "StringToBoolHookFunc",
+              "StringToComplex128HookFunc",
+              "StringToComplex64HookFunc",
+              "StringToFloat32HookFunc",
+              "StringToFloat64HookFunc",
+              "StringToIPHookFunc",
+              "StringToIPNetHookFunc",
+              "StringToInt16HookFunc",
+              "StringToInt32HookFunc",
+              "StringToInt64HookFunc",
+              "StringToInt8HookFunc",
+              "StringToIntHookFunc",
+              "StringToNetIPAddrHookFunc",
+              "StringToNetIPAddrPortHookFunc",
+              "StringToNetIPPrefixHookFunc",
+              "StringToTimeDurationHookFunc",
+              "StringToTimeHookFunc",
+              "StringToURLHookFunc",
+              "StringToUint16HookFunc",
+              "StringToUint32HookFunc",
+              "StringToUint64HookFunc",
+              "StringToUint8HookFunc",
+              "StringToUintHookFunc"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/go-viper/mapstructure/security/advisories/GHSA-2464-8j7c-4cjm"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/go-viper/mapstructure/commit/742921c9ba2854d27baa64272487fc5075d2c39c"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3900",
+    "review_status": "REVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3912.json b/data/osv/GO-2025-3912.json
new file mode 100644
index 0000000..08d984f
--- /dev/null
+++ b/data/osv/GO-2025-3912.json
@@ -0,0 +1,61 @@
+{
+  "schema_version": "1.3.1",
+  "id": "GO-2025-3912",
+  "modified": "0001-01-01T00:00:00Z",
+  "published": "0001-01-01T00:00:00Z",
+  "aliases": [
+    "CVE-2025-57801",
+    "GHSA-95v9-hv42-pwrj"
+  ],
+  "summary": "Gnark is vulnerable to signature malleability in EdDSA and ECDSA due to missing scalar checks in github.com/consensys/gnark",
+  "details": "Gnark is vulnerable to signature malleability in EdDSA and ECDSA due to missing scalar checks in github.com/consensys/gnark",
+  "affected": [
+    {
+      "package": {
+        "name": "github.com/consensys/gnark",
+        "ecosystem": "Go"
+      },
+      "ranges": [
+        {
+          "type": "SEMVER",
+          "events": [
+            {
+              "introduced": "0"
+            },
+            {
+              "fixed": "0.14.0"
+            }
+          ]
+        }
+      ],
+      "ecosystem_specific": {
+        "imports": [
+          {
+            "path": "github.com/consensys/gnark/std/signature/eddsa",
+            "symbols": [
+              "Verify"
+            ]
+          }
+        ]
+      }
+    }
+  ],
+  "references": [
+    {
+      "type": "ADVISORY",
+      "url": "https://github.com/Consensys/gnark/security/advisories/GHSA-95v9-hv42-pwrj"
+    },
+    {
+      "type": "FIX",
+      "url": "https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d82716e"
+    },
+    {
+      "type": "WEB",
+      "url": "https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d82716e"
+    }
+  ],
+  "database_specific": {
+    "url": "https://pkg.go.dev/vuln/GO-2025-3912",
+    "review_status": "REVIEWED"
+  }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3892.yaml b/data/reports/GO-2025-3892.yaml
new file mode 100644
index 0000000..8ef734a
--- /dev/null
+++ b/data/reports/GO-2025-3892.yaml
@@ -0,0 +1,36 @@
+id: GO-2025-3892
+modules:
+    - module: github.com/hashicorp/go-getter
+      versions:
+        - fixed: 1.7.9
+      vulnerable_at: 1.7.8
+      packages:
+        - package: github.com/hashicorp/go-getter
+          symbols:
+            - GitGetter.fetchSubmodules
+            - copyDir
+          derived_symbols:
+            - Client.ChecksumFromFile
+            - Client.Get
+            - FolderStorage.Get
+            - Get
+            - GetAny
+            - GetFile
+            - GitGetter.Get
+            - GitGetter.GetFile
+            - HttpGetter.Get
+summary: |-
+    HashiCorp go-getter Vulnerable to Symlink Attacks in
+    github.com/hashicorp/go-getter
+cves:
+    - CVE-2025-8959
+ghsas:
+    - GHSA-wjrx-6529-hcj3
+references:
+    - advisory: https://github.com/advisories/GHSA-wjrx-6529-hcj3
+    - fix: https://github.com/hashicorp/go-getter/commit/87541b2501c00df5eaedea6acc61a2a4a4efa5b7
+    - web: https://discuss.hashicorp.com/t/hcsec-2025-23-hashicorp-go-getter-vulnerable-to-arbitrary-read-through-symlink-attack/76242
+source:
+    id: GHSA-wjrx-6529-hcj3
+    created: 2025-08-27T18:27:46.95276137Z
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3900.yaml b/data/reports/GO-2025-3900.yaml
new file mode 100644
index 0000000..ecc5c9f
--- /dev/null
+++ b/data/reports/GO-2025-3900.yaml
@@ -0,0 +1,50 @@
+id: GO-2025-3900
+modules:
+    - module: github.com/go-viper/mapstructure
+      vulnerable_at: 1.6.0
+    - module: github.com/go-viper/mapstructure/v2
+      versions:
+        - fixed: 2.4.0
+      vulnerable_at: 2.3.0
+      packages:
+        - package: github.com/go-viper/mapstructure/v2
+          symbols:
+            - StringToIntHookFunc
+            - Decoder.decodeFloat
+            - StringToUintHookFunc
+            - Decoder.decodeInt
+            - StringToFloat32HookFunc
+            - StringToUint8HookFunc
+            - StringToInt32HookFunc
+            - StringToIPNetHookFunc
+            - StringToUint32HookFunc
+            - StringToInt8HookFunc
+            - StringToIPHookFunc
+            - StringToBoolHookFunc
+            - StringToTimeHookFunc
+            - StringToURLHookFunc
+            - StringToComplex128HookFunc
+            - StringToNetIPPrefixHookFunc
+            - StringToNetIPAddrPortHookFunc
+            - StringToTimeDurationHookFunc
+            - StringToInt16HookFunc
+            - Decoder.decodeUint
+            - StringToUint16HookFunc
+            - StringToNetIPAddrHookFunc
+            - StringToUint64HookFunc
+            - Decoder.decodeBool
+            - StringToInt64HookFunc
+            - StringToComplex64HookFunc
+            - StringToFloat64HookFunc
+summary: |-
+    Go-viper's mapstructure May Leak Sensitive Information in Logs in
+    github.com/go-viper/mapstructure
+ghsas:
+    - GHSA-2464-8j7c-4cjm
+references:
+    - advisory: https://github.com/go-viper/mapstructure/security/advisories/GHSA-2464-8j7c-4cjm
+    - fix: https://github.com/go-viper/mapstructure/commit/742921c9ba2854d27baa64272487fc5075d2c39c
+source:
+    id: GHSA-2464-8j7c-4cjm
+    created: 2025-08-27T18:27:18.386407146Z
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3912.yaml b/data/reports/GO-2025-3912.yaml
new file mode 100644
index 0000000..f6dc0c3
--- /dev/null
+++ b/data/reports/GO-2025-3912.yaml
@@ -0,0 +1,27 @@
+id: GO-2025-3912
+modules:
+    - module: github.com/consensys/gnark
+      versions:
+        - fixed: 0.14.0
+      vulnerable_at: 0.13.0
+      packages:
+        - package: github.com/consensys/gnark/std/signature/eddsa
+          symbols:
+            - Verify
+summary: |-
+    Gnark is vulnerable to signature malleability in EdDSA and ECDSA due to missing
+    scalar checks in github.com/consensys/gnark
+cves:
+    - CVE-2025-57801
+ghsas:
+    - GHSA-95v9-hv42-pwrj
+references:
+    - advisory: https://github.com/Consensys/gnark/security/advisories/GHSA-95v9-hv42-pwrj
+    - fix: https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d82716e
+    - web: https://github.com/Consensys/gnark/commit/0ba6730f05537a351517998add89a61a0d82716e
+notes:
+    - create: failed to auto-populate symbols
+source:
+    id: GHSA-95v9-hv42-pwrj
+    created: 2025-08-27T18:24:11.620782439Z
+review_status: REVIEWED