Thanks barbaz for the reply. I have to say, based on what your saying NoScript is about the most counter-intuitive process I can thing of.
This is the way I see it from an intuitive (logical) concep.
1)
^https://roll\.bankofamerica\.com/.*
The above example (which I've used for BofA and posted a discussion on this in the past here on this forum or at least another bank based on this same principle) as I understood it would impart an "XSS exception" for any website that matches up to the wildcard and thereafter anything that a website would have in their URL after the wildcard. That is what makes intuitive sense. So what other websites would match that URL pattern? None as I see it other than BofA.
That said, back when I did this I was told presumably on this forum that I needed to add an ABE entry for this bank and was instructed to do the following in that regard:
Site .roll.bankofamerica.com
Accept from .bankofamerica.com
Deny
So I did this presuming what I've been told is what I needed to do and based on the instructions give me that this is what would be safe as well.
Also referring what I've made BOLD and since BOLD does not differentiate enough I'm referring to where the "1)" above (using RED colored fond would be helpful but doing this will NOT get past the asinine SPAM protection on this site which if it doesn't the user doesn't just get a warning and the post remains to be edited but the entire post is removed which is doubly ridiculous on it's face (but I better stop there to avoid the SPAM monster raising it ugly head on this board). So getting back to the red err I mean BOLD post, I have no idea why "\" had to be used instead of the standard "/" but so be it I tried both in reference to the following explanation.
Now getting back to this current problem, if I recall regarding Citibank I was unable to get the website to work at all with any wildcards so what DID work is entering the entire URL for the page that was causing the issue. Which was ^
https://online.citi.com/US/JPS/portal/Index.do" for Pale Moon and as I said before the other URL as well was needed for Firefox (back then I used FF, until I found the far far better PM browser).
Now let me ask you a question.
Common sense tells me that the XSS is bypassed for all website URL's that will specifically match this "^
https://online.citi.com/US/JPS/portal/Index.do".
Am I right?
So what other URL will match this other than Citibank?
And one last point, I'm not going to bother changing Profiles back and forth just to use a Bank and have NoScript work properly. For one thing I really NEVER use Firefox anyway and ONLY use Pale Moon exclusively (Firefox only used for comparison testing occasionally like in this case). And as I previously posted
Pale Moon has it's own built in XSS Filter code so in my mind if NoScript isn't able to do the job in a practical manner so be it, Pale Moon is also protecting me in regards to XSS vulnerabilities ANYWAY.
AM I WRONG HERE? (better leave off the red font to avoid SPAM detection on this odd forum. I'll be surprised if the post works frankly at this point with bold/underline).
It worked (font color is the SPAM problem obviously after taking ½ to find out).
So in conclusion, the way I see it since I'm using Pale Moon, I am protected by Pale Moon in regards to XSS protection for this Citibank site and for the Merrill Edge website in regards to processing trades only (and the only site that has an XSS protection issue with Pale Moon's XXS protection function) I'm protected by NoScript for this Merrill Edge website regardless. So if one XSS has a problem the other XSS will do the job whether it be NoScript of Pale Moon. Which I have to say with all the issues regarding this protection level it's good I am using both Pale Moon and NoScript which both work seamlessly together by the way. All of which I intended to post prior to you lock on this topic.
Thanks for all your help.
MAN O MAN, THANK GOODNESS FOR Form History Control, as I posted the insane SPAM filter kicked in so I started trying to post in steps until I found that it all came down to ONE entry regarding font color causing the problem.
I DON'T KNOW HOW YOU GUYS PUT UP WITH THIS CRAZY SPAM PROTECTION ON THIS FORUM. I have a suggestion, how about they just disable the "Font color" button in this forum since using this will apparently not get past the weird SPAM protection on this board.

Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.9) Gecko/20100101 Goanna/2.0 Firefox/38.9 PaleMoon/26.2.1