network – What are all the services that are shown in the output of nmap ? Are they safe?

I am trying to find out all the vulnerabilities associated with my application and data server (both on the same machine). So I’ve decided to run nmap to see all the ports and other information that an invader could gain to attack my servers. The result of nmap shows many services and now I am very paranoid and alarmed that what exactly are those services and should I take any action in that regard. I ran a complete nmap against the IP of my server please if you see any vulnerability that needs to be taken care of, please let me know.

The XML result of my scan :

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE nmaprun>
<?xml-stylesheet href="file:///C:/Program Files (x86)/Nmap/nmap.xsl" type="text/xsl"?>
<!-- Nmap 7.91 scan initiated Tue Jun 15 01:16:20 2021 as: nmap -O -sA -sV -v -oX E:\out4  
0.100.110.1 -->
<nmaprun scanner="nmap" args="nmap -O -sA -sV -v -oX E:\out4 10.100.110.1" start="1623703580" 
startstr="Tue Jun 
15 01:16:20 2021" version="7.91" xmloutputversion="1.05">

<scaninfo type="ack" protocol="tcp" numservices="1000" services="1,3-4,6-7,9,13,17,19- 
26,30,32-33,37,42-43,49,53,70,79-85,88-90,99-100,106,109-111,113,119,125,135,139,143- 
144,146,161,163,179,199,211-212,222,254-256,259,264,280,301,306,311,340,366,389,406-407,416- 
417,425,427,443-445,458,464-465,481,497,500,512-515,524,541,543-545,548,554 
555,563,587,593,616-617,625,631,636,646,648,666- 
668,683,687,691,700,705,711,714,720,722,726,749,765,777,783,787,800 
801,808,843,873,880,888,898,900-903,911-912,981,987,
990,992-993,995,999-1002,1007,1009-1011,1021-1100,1102,1104-1108,1110-1114,1117,1119,1121- 
1124,1126,1130-1132,1137-1138,1141,1145,1147-1149,1151-1152,1154,1163-1166,1169,1174- 
1175,1183,1185-1187,1192, 1198-1199,1201,1213,1216-1218,1233-1234,1236,1244,1247- 
1248,1259,1271-1272,1277,1287,1296,1300-1301, 1309-1311,1322,1328,1334,1352,1417,1433- 
1434,1443,1455,1461,1494,1500-1501,1503,1521,1524,1533,1556,
1580,1583,1594,1600,1641,1658,1666,1687-1688,1700,1717-1721,1723,1755,1761,1782- 
1783,1801,1805,1812,1839-1840,1862-1864,1875,1900,1914,1935,1947,1971-1972,1974,1984,1998- 
2010,2013,2020-2022,2030,2033-2035, 2038,2040-2043,2045-2049,2065,2068,2099-2100,2103,2105- 
2107,2111,2119,2121,2126,2135,2144,2160-2161,
2170,2179,2190-2191,2196,2200,2222,2251,2260,2288,2301,2323,2366,2381-2383,2393- 
2394,2399,2401,2492,
2500,2522,2525,2557,2601-2602,2604-2605,2607-2608,2638,2701-2702,2710,2717 
...... ***AND SO MANY OTHERS***"/>

<verbose level="1"/>
<debugging level="0"/>
<taskbegin task="ARP Ping Scan" time="1623703581"/>
<hosthint><status state="up" reason="arp-response" reason_ttl="0"/>
<address addr="10.100.110.1" addrtype="ipv4"/>
<address addr="00:90:FB:--:--:--" addrtype="mac" vendor="Portwell"/>
<hostnames>
</hostnames>
</hosthint>
<taskend task="ARP Ping Scan" time="1623703581" extrainfo="1 total hosts"/>
<taskbegin task="Parallel DNS resolution of 1 host." time="1623703581"/>
<taskend task="Parallel DNS resolution of 1 host." time="1623703581"/>
<taskbegin task="ACK Scan" time="1623703581"/>
<taskend task="ACK Scan" time="1623703586" extrainfo="1000 total ports"/>
<taskbegin task="Service scan" time="1623703586"/>
<taskbegin task="NSE" time="1623703588"/>
<taskend task="NSE" time="1623703588"/>
<taskbegin task="NSE" time="1623703588"/>
<taskend task="NSE" time="1623703589"/>
<host starttime="1623703581" endtime="1623703589"><status state="up" reason="arp-response" 
reason_ttl="0"/>
<address addr="10.100.110.1" addrtype="ipv4"/>
<address addr="00:90:FB:--:--:--" addrtype="mac" vendor="Portwell"/>
<hostnames>
</hostnames>
<ports><extraports state="filtered" count="995">
<extrareasons reason="no-responses" count="995"/>
</extraports>
<port protocol="tcp" portid="80"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="http" method="table" conf="3"/></port>
<port protocol="tcp" portid="443"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="https" method="table" conf="3"/></port>
<port protocol="tcp" portid="8009"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="ajp13" method="table" conf="3"/></port>
<port protocol="tcp" portid="8080"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="http-proxy" method="table" conf="3"/></port>
<port protocol="tcp" portid="9100"><state state="unfiltered" reason="reset" reason_ttl="64"/> 
<service name="jetdirect" method="table" conf="3"/></port>
</ports>
<os><osmatch name="Citrix Access Gateway VPN gateway" accuracy="90" line="19121">
<osclass type="proxy server" vendor="Citrix" osfamily="embedded" accuracy="90"/>
</osmatch>
<osmatch name="Linux 2.6.11" accuracy="90" line="47658">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.11</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.18" accuracy="90" line="48967">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.18</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.18.8 (openSUSE 10.2)" accuracy="90" line="50376">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.18.8</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.18.8 (openSUSE 10.2, SMP)" accuracy="90" line="50394">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.18.8</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.20.6" accuracy="90" line="50744">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.20.6</cpe></osclass>
</osmatch>
<osmatch name="Linux 2.6.23" accuracy="90" line="51987">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="2.6.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:2.6.23</cpe></osclass>
</osmatch>
<osmatch name="OpenWrt Chaos Calmer 15.05 (Linux 3.18)" accuracy="90" line="62171">
<osclass type="broadband router" vendor="Linux" osfamily="Linux" osgen="3.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:3.18</cpe></osclass>
</osmatch>
<osmatch name="Linux 3.10 - 4.11" accuracy="90" line="63442">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="3.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:3</cpe></osclass>
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="4.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:4</cpe></osclass>
</osmatch>
<osmatch name="Linux 3.10 - 4.4" accuracy="90" line="63470">
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="3.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:3</cpe></osclass>
<osclass type="general purpose" vendor="Linux" osfamily="Linux" osgen="4.X" accuracy="90"> 
<cpe>cpe:/o:linux:linux_kernel:4</cpe></osclass>
</osmatch>
</os>
<distance value="1"/>
<times srtt="212" rttvar="419" to="100000"/>
</host>
<runstats><finished time="1623703589" timestr="Tue Jun 15 01:16:29 2021" summary="Nmap done at 
Tue Jun 15 01:16:29 2021; 1 IP address 
(1 host up) scanned in 9.89 seconds" elapsed="9.89" exit="success"/><hosts up="1" down="0" 
total="1"/>
</runstats>
</nmaprun>