Vulnerable Word Press site with malware blacklisted?

Outdated: WordPress Version
4.3.12
Version does not appear to be latest 4.8.2 - update now.

WordPress Plugins
The following plugins were detected by reading the HTML source of the WordPress sites front page.

wp-super-cache 1.4.6 latest release (1.5.7) Update required
https://wordpress.org/plugins/wp-super-cache/
spoontalk-social-media-icons-widget 1.5 latest release (1.5)
ultimate-responsive-image-slider 2.7 latest release (3.0.7) Update required
https://weblizar.com/plugins/ultimate-responsive-image-slider-pro/
Plugins are a source of many security vulnerabilities within WordPress installations, always keep them updated to the latest version available and check the developers plugin page for information about security related updates and fixes.

Warning User Enumeration is possible
The first two user ID’s were tested to determine if user enumeration is possible.

ID User Login
1 Kimmie thekimmie
2 Josh Cooper joshuag-coopergmail-com

Two vulnerable jQuery libraries: http://retire.insecurity.today/#!/scan/bb427a4f37d8fd900f4a2152547733fbd0bfa542eccc892b19967a9e328212ef

F-Grade status and recommendations: https://observatory.mozilla.org/analyze.html?host=nailsbykimmie.com
Subresource Integrity (SRI) not implemented, but all scripts are loaded from a similar origin

No reverse DNS: http://toolbar.netcraft.com/site_report?url=http://nailsbykimmie.com

polonus