how i remove blocks from my website rlnk.us

hi

My Avast premium security gives me a block message when I try to connect to my website
https://rlnk.us
https://www.rlnk.us
I make scans for my website from many security companies like
https://quttera.com/detailed_report/rlnk.us
It always gives a clean
how I can remove this block

thanks

how I can remove this block
https://forum.avast.com/index.php?topic=14433.msg1289438#msg1289438

Blacklisted by 16 vendors https://www.virustotal.com/gui/url/82b881ea79f1dc30ab4b9fb7554ebac31fbbe93979631e36199ae4264ab0a840?nocache=1

Consider: https://intelx.io/?s=https%3A%2F%2Frlnk.us%2F
and https://urlscan.io/result/522386f2-affc-4492-833b-f2caffc50854/dom/
and https://zulu.zscaler.com/submission/0f00a499-aa6c-417d-8208-18c0b2154fd9

polonus

thanks for your reply

ok I will consider all you suggested, and review and I will fix all issues in the reports

note: this website function is only a URL shortener

I fixed all issues in “rlnk.us” and reviewed them with Google Safe browsing
and get mail with the results

Review successful for rlnk.us
To: Webmaster of rlnk.us,
Google has received and processed your security review request. Google systems indicate that rlnk.us no longer contains links to harmful sites or downloads. The warnings visible to users are being removed from your site. This may take a few hours to happen.

thanks for your support

rlnk.us

I have just visited the site and no Avast alert either.

Avast does not flag it. But you have issues with retirable.js →

bootstrap 3.3.6 Found in -https://rlnk.us/js/boot/bootstrap.min.js _____Vulnerability info:
Medium 28236 XSS in data-template, data-content and data-title properties of tooltip/popover CVE-2019-8331
Medium 20184 XSS in data-target property of scrollspy CVE-2018-14041
Medium 20184 XSS in collapse data-parent attribute CVE-2018-14040
Medium 20184 XSS in data-container property of tooltip CVE-2018-14042
Medium XSS is possible in the data-target attribute. CVE-2016-10735
jquery 1.11.2 Found in -https://rlnk.us/js/jquery/jquery.min.js _____Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers
Medium CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution 123
Medium CVE-2020-11022 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Medium CVE-2020-11023 Regex in its jQuery.htmlPrefilter sometimes may introduce XSS

Found using Hint in the developer console of the browser are
furthermore issues with best practices as
‘external link disown opener’ (3 errors)
Disallowed HTTP headers (43 warnings)
Valid “Set cookies header” (3 errors)
Use X-Content-Type-Options (3 errors)

That’s all, let website development look into it a.s.a.p,

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)