diff --git a/scripts/hostmap-ip2hosts.nse b/scripts/hostmap-ip2hosts.nse
index 36b6b23dd..a0b38a44f 100644
--- a/scripts/hostmap-ip2hosts.nse
+++ b/scripts/hostmap-ip2hosts.nse
@@ -38,7 +38,7 @@ The script is in the "external" category because it sends target IPs to a third
-- output_nmap.org
---
-author = {'Paulino Calderon '}
+author = "Paulino Calderon "
license = "Same as Nmap--See http://nmap.org/book/man-legal.html"
diff --git a/scripts/http-adobe-coldfusion-apsa1301.nse b/scripts/http-adobe-coldfusion-apsa1301.nse
index ffdc68c24..21c517fcd 100644
--- a/scripts/http-adobe-coldfusion-apsa1301.nse
+++ b/scripts/http-adobe-coldfusion-apsa1301.nse
@@ -1,5 +1,5 @@
description = [[
-Attempts to exploit an authentication bypass vulnerability in Adobe Coldfusion servers (APSA13-01:http://www.adobe.com/support/security/advisories/apsa13-01.html) to retrieve a valid administrator's session cookie.
+Attempts to exploit an authentication bypass vulnerability in Adobe Coldfusion servers (APSA13-01: http://www.adobe.com/support/security/advisories/apsa13-01.html) to retrieve a valid administrator's session cookie.
]]
---
diff --git a/scripts/http-coldfusion-subzero.nse b/scripts/http-coldfusion-subzero.nse
index 8e19853e8..3badbeed7 100644
--- a/scripts/http-coldfusion-subzero.nse
+++ b/scripts/http-coldfusion-subzero.nse
@@ -1,5 +1,5 @@
description = [[
-Attempts to retrieve version, absolute path of administration panel and the file 'password.properties' in vulnerable installations of ColdFusion 9 and 10.
+Attempts to retrieve version, absolute path of administration panel and the file 'password.properties' from vulnerable installations of ColdFusion 9 and 10.
This was based on the exploit 'ColdSub-Zero.pyFusion v2'.
]]
diff --git a/scripts/http-comments-displayer.nse b/scripts/http-comments-displayer.nse
index d69a2fd6a..217415766 100644
--- a/scripts/http-comments-displayer.nse
+++ b/scripts/http-comments-displayer.nse
@@ -1,5 +1,5 @@
description = [[
-Extracts and outputs HTML/JS comments from HTTP responses.
+Extracts and outputs HTML and JavaScript comments from HTTP responses.
]]
---
diff --git a/scripts/http-phpmyadmin-dir-traversal.nse b/scripts/http-phpmyadmin-dir-traversal.nse
index 11fa14a52..8e20a0580 100644
--- a/scripts/http-phpmyadmin-dir-traversal.nse
+++ b/scripts/http-phpmyadmin-dir-traversal.nse
@@ -4,7 +4,7 @@ local http = require "http"
local vulns = require "vulns"
description = [[
-Exploits a directory traversal vulnerability in phpMyAdmin 2.6.4-pl1 to retrieve remote files on the web server. Other phpmyadmin versions might be vulnerable.
+Exploits a directory traversal vulnerability in phpMyAdmin 2.6.4-pl1 (and possibly other versions) to retrieve remote files on the web server.
Reference:
* http://www.exploit-db.com/exploits/1244/
diff --git a/scripts/http-stored-xss.nse b/scripts/http-stored-xss.nse
index 999f86a17..d0aa07421 100644
--- a/scripts/http-stored-xss.nse
+++ b/scripts/http-stored-xss.nse
@@ -1,7 +1,7 @@
description = [[
-This script will POST specially crafted strings to every form it
-encounters and then it will search through the website for those
-strings to check if the payloads were succesful.
+Posts specially crafted strings to every form it
+encounters and then searches through the website for those
+strings to determine whether the payloads were succesful.
]]
---
diff --git a/scripts/ike-version.nse b/scripts/ike-version.nse
index 34f2fe4b8..73b3eac70 100644
--- a/scripts/ike-version.nse
+++ b/scripts/ike-version.nse
@@ -6,10 +6,9 @@ local ike = require "ike"
description=[[
- Get information from an IKE service.
- Tests the service with both Main and Aggressive Mode.
- Sends multiple transforms in a single request, so currently,
- only four packets are sent to the host.
+
+ Obtains information (such as vendor and device type where available) from an IKE service by sending four packets to the host. This scripts tests with both Main and Aggressive Mode and sends multiple transforms per request.
+
]]
diff --git a/scripts/mysql-enum.nse b/scripts/mysql-enum.nse
index d02380c2b..054d0ef86 100644
--- a/scripts/mysql-enum.nse
+++ b/scripts/mysql-enum.nse
@@ -10,15 +10,14 @@ local string = require "string"
local openssl = stdnse.silent_require "openssl"
description = [[
-Performs valid user enumeration against MySQL server.
+Performs valid-user enumeration against MySQL server using a bug
+discovered and published by Kingcope
+(http://seclists.org/fulldisclosure/2012/Dec/9).
Server version 5.x are succeptible to an user enumeration
attack due to different messages during login when using
old authentication mechanism from versions 4.x and earlier.
-Original bug discovered and published by Kingcope:
-http://seclists.org/fulldisclosure/2012/Dec/9
-
]]
---
diff --git a/scripts/teamspeak2-version.nse b/scripts/teamspeak2-version.nse
index 799e62bee..ca3ec1eb7 100644
--- a/scripts/teamspeak2-version.nse
+++ b/scripts/teamspeak2-version.nse
@@ -5,7 +5,7 @@ local bin = require "bin"
local stdnse = require "stdnse"
description = [[
-Detects the TeamSpeak 2 server UDP voice communication service.
+Detects the TeamSpeak 2 voice communication server and attempts to determine version and configuration information.
A single UDP packet (a login request) is sent. If the server does not have a
password set, the exact version, name, and OS type will also be reported on.
diff --git a/scripts/ventrilo-info.nse b/scripts/ventrilo-info.nse
index 0002d641a..4b7cdabe3 100644
--- a/scripts/ventrilo-info.nse
+++ b/scripts/ventrilo-info.nse
@@ -9,8 +9,9 @@ local shortport = require "shortport"
description = [[
Detects the Ventrilo voice communication server service versions 2.1.2
-and above. Some of the older versions (pre 3.0.0) may not have the UDP
-service this probe relies on enabled by default.
+and above and tries to determine version and configuration
+information. Some of the older versions (pre 3.0.0) may not have the
+UDP service that this probe relies on enabled by default.
The Ventrilo server listens on a TCP (voice/control) and an UDP (ping/status)
port with the same port number (fixed to 3784 in the free version, otherwise