I will point out that this information is all publicly accessible, easily scanned for, and poses potential risk to any information you post on this site - "private" or otherwise.
I suggest that the new site owner take this information seriously, and if you do not currently have a digital security expert on your team, hire one. I am offering this information here and publicly for your consumption, in the hopes that something be done about it for the safety of the information you just forked a bunch of money over for. Consider my services free today.
For some of these I will be copy-pasting ver-batim the information provided by my tools. Not for lack of caring, but simply to show exactly what information can be easily pulled and subsequently exploited.
Note also that I am not going to even list out ALL of the vulnerabilities. The truth is that there are too many to post them all.
JQuery 1.11.0.: JQuery is currently on version
3.4.0. It may surprise you to know, but even older Javascript frameworks (especially JQuery prior to V1.9) can pose security vulnerabilities. Here's a basic example of one of the issues fixed in a now-old version of one of JQuery's dependencies pertaining to security:
https://github.com/jquery/jquery/commit/835e9218beef8f0c559d...
I suggest updating the site to use the latest version of JQuery. You will find that some syntax has changed and you will need to account for that with some adjustments to code on the site, but generally this should not be particularly difficult to develop.
XSS Vulnerabilities: XSS vulnerabilities occur when the Web application echoes user-supplied data in an HTML response sent to the Web browser. For example, a Web application might include the user's name as part of a welcome message or display a home address when confirming a shipping destination. If the user-supplied data contain characters that are interpreted as part of an HTML element instead of literal text, then an attacker can modify the HTML that is received by the victim's Web browser.
The XSS payload is echoed in HTML document returned by the request. An XSS payload may consist of HTML, JavaScript or other content that will be rendered by the browser. In order to exploit this vulnerability, a malicious user would need to trick a victim into visiting the URL with the XSS payload.
Impact:
XSS exploits pose a significant threat to a Web application, its users and user data. XSS exploits target the users of a Web application rather than the Web application itself. An exploit can lead to theft of the user's credentials and personal or financial information. Complex exploits and attack scenarios are possible via XSS because it enables an attacker to execute dynamic code. Consequently, any capability or feature available to the Web browser (for example HTML, JavaScript, Flash and Java applets) can be used to as a part of a compromise.
Solution:
Filter all data collected from the client including user-supplied content and browser content such as Referrer and User-Agent headers. Any data collected from the client and displayed in a Web page should be HTML-encoded to ensure the content is rendered as text instead of an HTML element or JavaScript.
This one pertains to the forum software specifically. Unfortunately the nature of forums makes them easy to toss up, and seemingly "dangerous" to maintain. Why change what isn't broken, right? It looks good, people are using it, so it's good! Except it's not. Same as maintaining an operating system, vulnerabilities come with time as people dig deeper and find exploits. I can guarantee that this is easily exploited, should anyone care to do so.
Login Form Is Not Submitted Via HTTPS: This one has been discussed here before and you really need to fix it. It's a relatively easy fix, it's potentially free, though as I pointed out in the previous discussion, paid options CAN provide better security - the free version of SSL (LetsEncrypt for instance) is more susceptible to attack due simply to sheer volume of use.
Impact:
Sensitive data such as authentication credentials should be encrypted when transmitted over the network. Otherwise they are exposed to sniffing attacks.
Solution:
Change the login form's action to submit via HTTPS. Add SSL to the site. Seriously.
NOTE: I see that there IS an SSL cert associated with the site but it is both expired AND not actually correct for NA:
Certificate #0 CN=www.dainanderson.com ..." target="_blank">www.dainanderson.com ...; is not valid after Nov 15 12:40:01 2018 GMT.
Certificate #1 CN=www.dainanderson.com
Looks like Dain may have tried to set up SSL and then... got busy or something?
HTTP TRACE / TRACK Methods Enabled: The remote Web server supports the TRACE and/or TRACK HTTP methods, which makes it easier for remote attackers to steal cookies and authentication credentials or bypass the HttpOnly protection mechanism. Track/Trace are required to be disabled to be PCI compliant. Though you don't need to be PCI compliant as you do not collect CC information for sales (currently), this still poses other serious risks (as below). If you ever intend to offer any sort of premium membership or anything of the sort then this will be even more important than it already is.
Impact:
If this vulnerability is successfully exploited, attackers can potentially steal cookies and authentication credentials, or bypass the HttpOnly protection mechanism.
Solution:
Disable these methods in your web server's configuration file.
Web Server Uses Plain-Text Form Based Authentication: The Web server uses plain-text form based authentication. A web page exists on the target host which uses an HTML login form. This data is sent from the client to the server in plain-text.
Impact:
An attacker with access to the network traffic to and from the target host may be able to obtain login credentials for other users by sniffing the network traffic.
Solution:
Please contact the vendor of the hardware/software for a possible fix for the issue. For custom applications, ensure that data sent via HTML login forms is encrypted before being sent from the client to the host.
Some quick tidbits of info I could use to attack you:
Service name: FTP on TCP port 21.
Close that shit. Use SFTP and lock it to a whitelist or something.
220 Welcome to the NintendoAge.com File Server!
Lol.
Vulnerable to slow HTTP POST attack
Connection with partial POST body remained open for: 194459 milliseconds
Server resets timeout after accepting request data from peer.
DDoS.
SMB Signing Disabled or SMB Signing Not Required
Unauthorized users sniffing the network could catch many challenge/response exchanges and replay the whole thing to grab particular session keys, and then authenticate on the Domain Controller.
There's more but I won't bore you with all the Low Risk items.