However this was found on that page to be retired:
Retire.js
bootstrap 3.3.5 Found in
hxtps://www3.rbcigroupbenefits.com/secureapp/ugr0/Authenticate_UI/mediaimages/rbcoli_files/bootstrap.min.js
Vulnerability info:
High 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331 1
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042
jquery 1.11.3 Found in htxps://www3.rbcigroupbenefits.com/secureapp/ugr0/Authenticate_UI/mediaimages/rbcoli_files/jquery.min.js
Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution 123
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
JavaScript errors because of blockers:
File not found: /secureapp/ugr0/Authenticate_UI/mediaimages/rbcoli_files/keypress.js
File not found: htxps://nexus.ensighten.com/rbc/insurance/Bootstrap.js
On the orher hand, if not Akamai abuse, cloud done: wXw3.rbcigroupbenefits.com
Bootstrap, script
Not vulnerable
Font Awesome, html
Not vulnerable
jQuery, script
Not vulnerable
Unique IDs about your web browsing habits have been securely sent to third parties.
Now let us all wait for a final verdict from avast team, as to the reported FP.
As they are the only ones to come and unblock because of an apparent FP.
polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)