diff --git a/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb b/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb
index 5458c5182..165554454 100644
--- a/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb
+++ b/modules/commands/network/vtiger_crm_upload_exploit/vtiger_crm_upload_exploit.rb
@@ -7,7 +7,7 @@ class Vtiger_crm_upload_exploit < BeEF::Command
def initialize
super({
'Name' => 'VTiger CRM Upload Exploit',
- 'Description' => 'This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM vtiger 5.0.4',
+ 'Description' => 'This module demonstrates chained exploitation. It will upload and execute a reverse bindshell. The vulnerability is exploited in the CRM vtiger 5.0.4
Don\'t forget to start a listener on your PC, for example: nc -l 8888',
'Category' => 'Network',
'Author' => ['wade', 'bm', 'pipes', 'xntrik'],
'Data' =>