tubepress.js is known Spam detected: spam-seo.spammy_keywords?5.514 on website

See: https://urlquery.net/report/fba7a24e-ff7f-416c-9c42-b576a950887f
Read: http://www.globalsecuritymag.fr/Vigil-nce-WordPress-TubePress,20160314,60495.html
Also 3 detect: https://www.virustotal.com/#/url/eaf2e7e25f74237396914029758021f9dc1d40e0f6da0388dd09c33f508851eb/detection
Spreading malware as known infection source: https://www.virustotal.com/#/domain/greatbeautyadvice.com
Read: https://www.webarxsecurity.com/what-is-seo-spam/
Cloaking and the spammy links shown here: http://www.isithacked.com/check/greatbeautyadvice.com%2F
See also: https://aw-snap.info/file-viewer/?protocol=not-secure&ref_sel=GSP2&ua_sel=ff&chk-cache=&fs=1&tgt=Z317fHRie3x1dHl8I3ZbXnsuXl1t~enc
Re: https://sitecheck.sucuri.net/results/greatbeautyadvice.com/wp-content/plugins/tubepress/ui/lib/tubepress.js
Outdated: WordPress Version
3.2.1
Version does not appear to be latest

Outdated plug-ins: The following plugins were detected by reading the HTML source of the WordPress sites front page.

mingle-forum 1.0.21.1
transposh-translation-filter-for-wordpress 0.4.3 latest release (1.0.3) Update required
http://transposh.org/
featured-content-gallery latest release (3.2.0)
http://www.featuredcontentgallery.com
all-in-one-seo-pack latest release (2.9.1)
https://semperplugins.com/all-in-one-seo-pack-pro-version/
wp-pagenavi 2.50 latest release (2.93) Update required
https://lesterchan.net/portfolio/programming/php/
tubepress latest release (3.1.8)
http://tubepress.com
contact-form-7 latest release (5.0.5)
https://contactform7.com/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version.

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 admin admin
2 None None
It is recommended to rename the admin user account to reduce the chance of brute force attacks occurring. As this will reduce the chance of automated password attackers gaining access. However it is important to understand that if the author archives are enabled it is usually possible to enumerate all users within a WordPress installation.

Vulnerable jQuery library: https://retire.insecurity.today/#!/scan/82b2d625e4c09c9266ae6156e9a5a7efae7a13fd889308094839b8b4f8d1fdb3

polonus (volunteer website security analyst and website error-hunter)