diff --git a/scripts/address-info.nse b/scripts/address-info.nse
index bbdf3ee46..58083d65d 100644
--- a/scripts/address-info.nse
+++ b/scripts/address-info.nse
@@ -1,5 +1,5 @@
description = [[
-Shows extra information about IP addresses.
+Shows extra information about IPv6 addresses, such as embedded MAC or IPv4 addresses when applicable.
Some IP address formats encode extra information; for example some IPv4
addresses encode an IPv4 address or MAC address. This script can decode
diff --git a/scripts/bittorrent-discovery.nse b/scripts/bittorrent-discovery.nse
index 989f6387c..b8abc1ead 100755
--- a/scripts/bittorrent-discovery.nse
+++ b/scripts/bittorrent-discovery.nse
@@ -1,9 +1,10 @@
description = [[
-Discovers bittorrent peers and nodes using the Bittorrent and DHT protocol when
-supplied with a valid torrent file or a magnet link. The peers implement the
-Bittorrent protocol and share the torrent, whereas the nodes implement the DHT
-protocol and are used to track the peers. The sets of peers and nodes are not
-the same, but they usually intersect.
+Discovers bittorrent peers sharing a file based on a user-supplied
+torrent file or magnet link. Peers implement the Bittorrent protocol
+and share the torrent, whereas the nodes (only shown if the
+include-nodes NSE argument is given) implement the DHT protocol and
+are used to track the peers. The sets of peers and nodes are not the
+same, but they usually intersect.
If the newtargets script-arg is supplied it adds the discovered
peers as targets.
diff --git a/scripts/broadcast-listener.nse b/scripts/broadcast-listener.nse
index 21f41d9c1..e10ccf36d 100644
--- a/scripts/broadcast-listener.nse
+++ b/scripts/broadcast-listener.nse
@@ -1,5 +1,5 @@
description = [[
-The script sniffs the network for incoming broadcast communication and
+Sniffs the network for incoming broadcast communication and
attempts to decode the received packets. It supports protocols like CDP, HSRP,
Spotify, DropBox, DHCP, ARP and a few more. See packetdecoders.lua for more
information.
diff --git a/scripts/ftp-brute.nse b/scripts/ftp-brute.nse
index da84a667e..96d572af5 100644
--- a/scripts/ftp-brute.nse
+++ b/scripts/ftp-brute.nse
@@ -1,5 +1,5 @@
description = [[
-Tries to get FTP login credentials by guessing usernames and passwords.
+Performs brute force password auditing against FTP servers.
This uses the standard unpwdb username/password list. However, in tests FTP servers are
significantly slower than other servers when responding, so the number of usernames/passwords
diff --git a/scripts/http-awstatstotals-exec.nse b/scripts/http-awstatstotals-exec.nse
index e5eee9991..321775885 100644
--- a/scripts/http-awstatstotals-exec.nse
+++ b/scripts/http-awstatstotals-exec.nse
@@ -1,5 +1,5 @@
description = [[
- http-awstatstotals-exec exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it. [CVE: 2008-3922]
+Exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it (CVE: 2008-3922).
This vulnerability can be exploited through the GET variable sort. The script queries the web server with the command payload encoded using PHP's chr() function:
?sort={%24{passthru%28chr(117).chr(110).chr(97).chr(109).chr(101).chr(32).chr(45).chr(97)%29}}{%24{exit%28%29}}
diff --git a/scripts/http-joomla-brute.nse b/scripts/http-joomla-brute.nse
index 075f81413..fad9d1fe1 100644
--- a/scripts/http-joomla-brute.nse
+++ b/scripts/http-joomla-brute.nse
@@ -1,5 +1,5 @@
description = [[
-Performs a brute force password attack against Joomla installations.
+Performs brute force password auditing against Joomla web CMS installations.
This script initially reads the session cookie and parses the security token to perfom the brute force password auditing.
It uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are stored using the
diff --git a/scripts/http-vuln-cve2011-3192.nse b/scripts/http-vuln-cve2011-3192.nse
index b926d3703..f5c1dd99d 100644
--- a/scripts/http-vuln-cve2011-3192.nse
+++ b/scripts/http-vuln-cve2011-3192.nse
@@ -1,6 +1,5 @@
description = [[
-This script will check for a denial of service vulnerability that has been
-found in the way the multiple overlapping/simple ranges are handled.
+Detects a denial of service vulnerability in the way the Apache web server handles requests for multiple overlapping/simple ranges of a page.
References:
* http://seclists.org/fulldisclosure/2011/Aug/175
diff --git a/scripts/http-waf-detect.nse b/scripts/http-waf-detect.nse
index 95a3cfb57..7454dd341 100644
--- a/scripts/http-waf-detect.nse
+++ b/scripts/http-waf-detect.nse
@@ -1,5 +1,5 @@
description = [[
-Determines if a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.
+Attempts to determine whether a web server is protected by an IPS (Intrusion Prevention System), IDS (Intrusion Detection System) or WAF (Web Application Firewall) by probing the web server with malicious payloads and detecting changes in the response code and body.
To do this the script will send a "good" request and record the response, afterwards it will match this response against new requests containing
malicious payloads. In theory, web applications shouldn't react to malicious requests because we are storing the payloads in a variable that is
diff --git a/scripts/http-wordpress-brute.nse b/scripts/http-wordpress-brute.nse
index 0b70d2110..0da913287 100644
--- a/scripts/http-wordpress-brute.nse
+++ b/scripts/http-wordpress-brute.nse
@@ -1,5 +1,5 @@
description = [[
-Performs a brute force password attack against Wordpress installations.
+performs brute force password auditing against Wordpress CMS/blog installations.
This script uses the unpwdb and brute libraries to perform password guessing. Any successful guesses are
stored using the credentials library.
diff --git a/scripts/http-wp-enum.nse b/scripts/http-wp-enum.nse
index 1bf2ff130..5151c2957 100644
--- a/scripts/http-wp-enum.nse
+++ b/scripts/http-wp-enum.nse
@@ -1,6 +1,5 @@
description = [[
-http-wp-enum enumerates usernames in Wordpress installations by exploiting an information disclosure vulnerability
-existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
+Enumerates usernames in Wordpress blog/CMS installations by exploiting an information disclosure vulnerability existing in versions 2.6, 3.1, 3.1.1, 3.1.3 and 3.2-beta2 and possibly others.
Original advisory:
* http://www.talsoft.com.ar/index.php/research/security-advisories/wordpress-user-id-and-user-name-disclosure