Nmap -script vuln scan questions

I recently installed nextcloud using docker. I then ran a nmap -script vuln scan from another server in the internet, I had the following results. Should I be concerned?

xxx@xxx:~# nmap -script vuln xxxxxxxxxxx
Starting Nmap 7.80 ( https://nmap.org ) at 2021-09-27 00:54 UTC
Nmap scan report for xxxxxxxxxxxxx (xxxxxxx)
Host is up (0.034s latency).
Not shown: 999 filtered ports
PORT STATE SERVICE
443/tcp open https
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
|_http-csrf: Couldn’t find any CSRF vulnerabilities.
|_http-dombased-xss: Couldn’t find any DOM based XSS.
|http-stored-xss: Couldn’t find any stored XSS vulnerabilities.
| ssl-dh-params:
| VULNERABLE:
| Diffie-Hellman Key Exchange Incorrectly Generated Group Parameters
| State: LIKELY VULNERABLE
| This TLS service appears to be using a modulus that is not a safe prime
| and does not correspond to any well-known DSA group for Diffie-Hellman
| key exchange.
| These parameters MAY be secure if:
| - They were generated according to the procedure described in
| FIPS 186-4 for DSA Domain Parameter Generation, or
| - The generator g generates a subgroup of large prime order
| Additional testing may be required to verify the security of these
| parameters.
| Check results:
| NON-SAFE GROUP 1
| Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
| Modulus Type: Non-safe prime
| Modulus Source: Unknown/Custom-generated
| Modulus Length: 4096
| Generator Length: 4096
| Public Key Length: 4096
| References:
|
https://weakdh.org
|_sslv2-drown:

Nmap done: 1 IP address (1 host up) scanned in 185.66 seconds

Normally, in the ssl config of your webserver, you can specify a file with the DH parameters. You can easily generate a new file that isn’t vulnerable:

Well, you check your server and you get some problem presented with a quick solution. What more do you want? Fix it!