diff --git a/exploits/aix/dos/34588.txt b/exploits/aix/dos/34588.txt
index 4843caa02..5e6ea00dc 100644
--- a/exploits/aix/dos/34588.txt
+++ b/exploits/aix/dos/34588.txt
@@ -1,9 +1,9 @@
# Exploit Title: PHP Stock Management System 1.02 - Multiple Vulnerabilty
# Date : 9-9-2014
# Author : jsass
-# Vendor Homepage: http://www.posnic.com/
-# Software Link: http://sourceforge.net/projects/stockmanagement/
-# Version: 1.02
+# Vendor Homepage: http://www.posnic.com/
+# Software Link: http://sourceforge.net/projects/stockmanagement/
+# Version: 1.02
# Tested on: kali linux
# Twitter : @KwSecurity
# Group : Q8 GRAY HAT TEAM
diff --git a/exploits/android/dos/39629.txt b/exploits/android/dos/39629.txt
index 1358bd93b..3e7bec8a0 100644
--- a/exploits/android/dos/39629.txt
+++ b/exploits/android/dos/39629.txt
@@ -4,8 +4,8 @@ The wireless driver for the Android One (sprout) devices has a bad copy_from_use
This ioctl is permitted for access from the untrusted-app selinux domain, so this is an app-to-kernel privilege escalation from any app with android.permission.INTERNET.
-See
- hello-jni.tar.gz for a PoC (NDK required to build) that should redirect kernel code execution to 0x40404040.
+See
+ hello-jni.tar.gz for a PoC (NDK required to build) that should redirect kernel code execution to 0x40404040.
[ 56.843672]-(0)[880:tx_thread]CPU: 0 PID: 880 Comm: tx_thread Tainted: G W 3.10.57-g9e1c396 #1
[ 56.844867]-(0)[880:tx_thread]task: dea3b480 ti: cb99e000 task.ti: cb99e000
diff --git a/exploits/cgi/webapps/34103.txt b/exploits/cgi/webapps/34103.txt
index 346c82c79..9c0544fe2 100644
--- a/exploits/cgi/webapps/34103.txt
+++ b/exploits/cgi/webapps/34103.txt
@@ -147,7 +147,7 @@ primary_tab=USERS&realm=&secondary_tab=per_user_add_update&user=benjaminKM
PoC: Benutzer > Neu Anlegen > Rolle: Auditor > Domänen > (domain_list_table-r0)
- %20">
diff --git a/exploits/hardware/local/44820.txt b/exploits/hardware/local/44820.txt
index 32c2c148e..3973cf14c 100644
--- a/exploits/hardware/local/44820.txt
+++ b/exploits/hardware/local/44820.txt
@@ -10,14 +10,14 @@ Due to the lack of proper checks after exiting the ROP chain, it is possible in
## PLEASE READ FIRST:
- For best results with the flash dumper, here are the recommended steps.
-- Open the browser & browse to the ps3xploit.com website, go to the page of the exploit you need. Set the current page as browser homepage. Don't launch the exploit initialization. Close the browser.
-- Open the browser. The exploit page will load automatically. Choose your dump path option or download the dump.jpg file if you use the hdd edition.
+- Open the browser & browse to the ps3xploit.com website, go to the page of the exploit you need. Set the current page as browser homepage. Don't launch the exploit initialization. Close the browser.
+- Open the browser. The exploit page will load automatically. Choose your dump path option or download the dump.jpg file if you use the hdd edition.
- Press the exploit initialization button & wait until initialization succeeds. If it fails, follow the refresh/reload instructions on screen.
-- Trigger the exploit.
-- On success, check your dump with the py checker tool.
+- Trigger the exploit.
+- On success, check your dump with the py checker tool.
## Usage Tips:
-- Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.
-- If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.
-- If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.
\ No newline at end of file
+- Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.
+- If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.
+- If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.
\ No newline at end of file
diff --git a/exploits/hardware/webapps/21395.txt b/exploits/hardware/webapps/21395.txt
index 67e61f835..64b74b140 100644
--- a/exploits/hardware/webapps/21395.txt
+++ b/exploits/hardware/webapps/21395.txt
@@ -140,7 +140,7 @@ align=``left``>