Is a JavaScript runtime built on Chrome`s V8 JavaScript engine

Node.js (64-bit)

Node.js 16.6.2 (64-bit)

  -  27.39 MB  -  Open Source
  • Latest Version

    Node.js 23.2.0 (64-bit)

  • Operating System

    Windows XP64 / Vista64 / Windows 7 64 / Windows 8 64 / Windows 10 64

  • User Rating

    Click to vote
  • Author / Product

    Node.js Foundation / External Link

  • Filename

    node-v16.6.2-x64.msi

  • MD5 Checksum

    f984b94dfb7af5d75fa35ff7a664fa39

Sometimes latest versions of the software can cause issues when installed on older devices or devices running an older version of the operating system.

Software makers usually fix these issues but it can take them some time. What you can do in the meantime is to download and install an older version of Node.js 16.6.2 (64-bit).


For those interested in downloading the most recent release of Node.js (64-bit) or reading our review, simply click here.


All old versions distributed on our website are completely virus-free and available for download at no cost.


We would love to hear from you

If you have any questions or ideas that you want to share with us - head over to our Contact page and let us know. We value your feedback!

  • Node.js 16.6.2 (64-bit) Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Node.js 16.6.2 (64-bit) Screenshot 1
  • Node.js 16.6.2 (64-bit) Screenshot 2
  • Node.js 16.6.2 (64-bit) Screenshot 3
  • Node.js 16.6.2 (64-bit) Screenshot 4

What's new in this version:

CVE-2021-3672/CVE-2021-22931: Improper handling of untypical characters in domain names (High):
- Node.js was vulnerable to Remote Code Execution, XSS, application crashes due to missing input validation of hostnames returned by Domain Name Servers in the Node.js DNS library which can lead to the output of wrong hostnames (leading to Domain Hijacking) and injection vulnerabilities in applications using the library.

CVE-2021-22930: Use after free on close http2 on stream canceling (High):
- Node.js was vulnerable to a use after free attack where an attacker might be able to exploit memory corruption to change process behavior. This release includes a follow-up fix for CVE-2021-22930 as the issue was not completely resolved by the previous fix.

CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (Low):
- If the Node.js HTTPS API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter, no error was returned and connections to servers with an expired certificate would have been accepted