This information might help an attacker gain a greater understanding of the systems in use and potentially develop further attacks targeted at the specific version of Nginx.
Impact: An attacker might use the disclosed information to harvest specific security vulnerabilities for the version identified.
Steps to reproduce:
1. Go to
2. Now the nginx version shows in bottom.