Really no need to freak over these. The 2nd (CVE-2025-7098) is very difficult and convoluted to employ, so is theoretical at best.
The other 2 presupposes that the attacker ALREADY has control of either the Local system (ability to execute low-privileged code), the connected Network or both in order to do any damage. Give me control of your system and I assure you I can do things to truly darken your day…