diff --git a/docs/refguide.xml b/docs/refguide.xml
index 77d25b972..255e7a8a6 100644
--- a/docs/refguide.xml
+++ b/docs/refguide.xml
@@ -3224,7 +3224,7 @@ support the option completely, as does UDP scan.
If you wish to see the options in packets sent and
received, specify . For more
information and examples of using IP options with Nmap, see
- .
+ .
diff --git a/ndiff/docs/ndiff.xml b/ndiff/docs/ndiff.xml
index afe844999..0ad3b0812 100644
--- a/ndiff/docs/ndiff.xml
+++ b/ndiff/docs/ndiff.xml
@@ -388,7 +388,7 @@ ln -sf scan-$date.xml scan-prev.xml
in Perl and C++, but the summer ended shortly after it was decided
to rewrite the program in Python for the sake of Windows (and
Zenmap) compatibility. This Python version was written by David
- Fifield. James Levine released a Perl script named Ndiff with
+ Fifield. James Levine released a Perl script named Ndiff with
similar functionality in 2000.
diff --git a/scripts/http-iis-webdav-vuln.nse b/scripts/http-iis-webdav-vuln.nse
index 536e856bd..c8cf5ab65 100644
--- a/scripts/http-iis-webdav-vuln.nse
+++ b/scripts/http-iis-webdav-vuln.nse
@@ -7,7 +7,7 @@ This script is based on the Metasploit modules/auxiliary/scanner/http/wmap_dir_w
For more information on this vulnerability and script, see:
* http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html
-* http://seclists.org/fulldisclosure/2009/May/att-0134/IIS_Advisory_pdf
+* http://seclists.org/fulldisclosure/2009/May/att-134/IIS_Advisory_pdf.bin
* http://www.skullsecurity.org/blog/?p=271
* http://www.kb.cert.org/vuls/id/787932
* http://www.microsoft.com/technet/security/advisory/971492.mspx
diff --git a/scripts/smb-check-vulns.nse b/scripts/smb-check-vulns.nse
index 10e7a240c..ebf1c8ce2 100644
--- a/scripts/smb-check-vulns.nse
+++ b/scripts/smb-check-vulns.nse
@@ -48,7 +48,7 @@ or higher to work. It is considered unsafe.
SMBv2 DoS -- performs a denial-of-service against the vulnerability disclosed in
CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista
and some versions of Windows 7, and causes a bluescreen if successful. The proof-
-of-concept code at was used,
+of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used,
with one small change.
(Note: if you have other SMB/MSRPC vulnerability checks you'd like to see added, and